Context: A generic approach for mitigating spectre
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …
performance and efficiency of modern processors. However, they are inconsiderate, leaking …
Dynpta: Combining static and dynamic analysis for practical selective data protection
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …
exploit mitigation technologies, the leakage of sensitive process data through the …
Cubicleos: A library os with software componentisation for practical isolation
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or
trusted execution environments. They often follow a highly modular design in which third …
trusted execution environments. They often follow a highly modular design in which third …
Annotating, tracking, and protecting cryptographic secrets with cryptompk
X **, X **ao, S Jia, W Gao, D Gu… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Protecting confidential data against memory disclosure attacks is crucial to many critical
applications, especially those involve cryptographic operations. However, it is neither easy …
applications, especially those involve cryptographic operations. However, it is neither easy …
Privado: Practical and secure DNN inference with enclaves
Cloud providers are extending support for trusted hardware primitives such as Intel SGX.
Simultaneously, the field of deep learning is seeing enormous innovation as well as an …
Simultaneously, the field of deep learning is seeing enormous innovation as well as an …
Mitigating information leakage vulnerabilities with type-based data isolation
Information leakage vulnerabilities (or simply info leaks) such as out-of-bounds/uninitialized
reads in the architectural or speculative domain pose a significant security threat, allowing …
reads in the architectural or speculative domain pose a significant security threat, allowing …
Spons & Shields: practical isolation for trusted execution
Trusted execution environments (TEEs) promise a cost-effective,“lift-and-shift” solution for
deploying security-sensitive applications in untrusted clouds. For this, they must support rich …
deploying security-sensitive applications in untrusted clouds. For this, they must support rich …
Harnessing the x86 intermediate rings for intra-process isolation
Modern applications often involve the processing of sensitive information. However, the lack
of privilege separation within the user space leaves sensitive application secrets such as …
of privilege separation within the user space leaves sensitive application secrets such as …
Towards Practical Application-level Support for Privilege Separation
Privilege separation (privsep) is an effective technique for improving software's security, but
privsep involves decomposing software into components and assigning them different …
privsep involves decomposing software into components and assigning them different …
Randomize the running function when it is disclosed
Address space layout randomization (ASLR) can hide code addresses, which has been
widely adopted by security solutions. However, code probes can bypass it. In real attack …
widely adopted by security solutions. However, code probes can bypass it. In real attack …