Context: A generic approach for mitigating spectre

M Schwarz, M Lipp, CA Canella… - Network and …, 2020 - graz.elsevierpure.com
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …

Dynpta: Combining static and dynamic analysis for practical selective data protection

T Palit, JF Moon, F Monrose… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …

Cubicleos: A library os with software componentisation for practical isolation

VA Sartakov, L Vilanova, P Pietzuch - Proceedings of the 26th ACM …, 2021 - dl.acm.org
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or
trusted execution environments. They often follow a highly modular design in which third …

Annotating, tracking, and protecting cryptographic secrets with cryptompk

X **, X **ao, S Jia, W Gao, D Gu… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Protecting confidential data against memory disclosure attacks is crucial to many critical
applications, especially those involve cryptographic operations. However, it is neither easy …

Privado: Practical and secure DNN inference with enclaves

K Grover, S Tople, S Shinde, R Bhagwan… - arxiv preprint arxiv …, 2018 - arxiv.org
Cloud providers are extending support for trusted hardware primitives such as Intel SGX.
Simultaneously, the field of deep learning is seeing enormous innovation as well as an …

Mitigating information leakage vulnerabilities with type-based data isolation

A Milburn, E Van Der Kouwe… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Information leakage vulnerabilities (or simply info leaks) such as out-of-bounds/uninitialized
reads in the architectural or speculative domain pose a significant security threat, allowing …

Spons & Shields: practical isolation for trusted execution

VA Sartakov, D O'Keeffe, D Eyers, L Vilanova… - Proceedings of the 17th …, 2021 - dl.acm.org
Trusted execution environments (TEEs) promise a cost-effective,“lift-and-shift” solution for
deploying security-sensitive applications in untrusted clouds. For this, they must support rich …

Harnessing the x86 intermediate rings for intra-process isolation

H Lee, C Song, BB Kang - IEEE Transactions on Dependable …, 2022 - ieeexplore.ieee.org
Modern applications often involve the processing of sensitive information. However, the lack
of privilege separation within the user space leaves sensitive application secrets such as …

Towards Practical Application-level Support for Privilege Separation

N Sultana, H Zhu, K Zhong, Z Zheng, R Mao… - Proceedings of the 38th …, 2022 - dl.acm.org
Privilege separation (privsep) is an effective technique for improving software's security, but
privsep involves decomposing software into components and assigning them different …

Randomize the running function when it is disclosed

YG Li, Y Bao, YC Chung - IEEE Transactions on Computers, 2024 - ieeexplore.ieee.org
Address space layout randomization (ASLR) can hide code addresses, which has been
widely adopted by security solutions. However, code probes can bypass it. In real attack …