Methodologies for quantifying (Re-) randomization security and timing under JIT-ROP
Just-in-time return-oriented programming (JIT-ROP) allows one to dynamically discover
instruction pages and launch code reuse attacks, effectively bypassing most fine-grained …
instruction pages and launch code reuse attacks, effectively bypassing most fine-grained …
Probabilistic timing analysis on conventional cache designs
Probabilistic timing analysis (PTA), a promising alternative to traditional worst-case
execution time (WCET) analyses, enables pairing time bounds (named probabilistic WCET …
execution time (WCET) analyses, enables pairing time bounds (named probabilistic WCET …
Guarder: A tunable secure allocator
Due to the on-going threats posed by heap vulnerabilities, we design a novel secure
allocator---Guarder---to defeat these vulnerabilities. Guarder is different from existing secure …
allocator---Guarder---to defeat these vulnerabilities. Guarder is different from existing secure …
What you can read is what you can't execute
Due to the address space layout randomization (ASLR), code reuse attacks (CRAs) require
memory probes to get available gadgets. Code reading is the basic way to obtain code …
memory probes to get available gadgets. Code reading is the basic way to obtain code …
Adelie: continuous address space layout re-randomization for Linux drivers
R Nikolaev, H Nadeem, C Stone… - Proceedings of the 27th …, 2022 - dl.acm.org
While address space layout randomization (ASLR) has been extensively studied for user-
space programs, the corresponding OS kernel's KASLR support remains very limited …
space programs, the corresponding OS kernel's KASLR support remains very limited …
Automated generation and evaluation of JMH microbenchmark suites from unit tests
M Jangali, Y Tang, N Alexandersson… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Performance is a crucial non-functional requirement of many software systems. Despite the
widespread use of performance testing, developers still struggle to construct and evaluate …
widespread use of performance testing, developers still struggle to construct and evaluate …
Testing a Formally Verified Compiler
D Monniaux, L Gourdin, S Boulmé… - … Conference on Tests and …, 2023 - Springer
Testing a Formally Verified Compiler | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
Indexed Types for a Statically Safe WebAssembly
AT Geller, J Frank, WJ Bowman - Proceedings of the ACM on …, 2024 - dl.acm.org
We present Wasm-prechk, a superset of WebAssembly (Wasm) that uses indexed types to
express and check simple constraints over program values. This additional static reasoning …
express and check simple constraints over program values. This additional static reasoning …
Containing timing-related certification cost in automotive systems deploying complex hardware
Measurement-Based Probabilistic Timing Analysis (MBPTA) techniques simplify deriving
tight and trustworthy WCET estimates for industrial-size programs running on complex …
tight and trustworthy WCET estimates for industrial-size programs running on complex …
Reliable power and time-constraints-aware predictive management of heterogeneous exascale systems
The transition to Exascale computing is going to be characterised by an increased range of
application classes. In addition to traditional massively parallel" number crunching" …
application classes. In addition to traditional massively parallel" number crunching" …