PKRU-Safe: Automatically locking down the heap between safe and unsafe languages

P Kirth, M Dickerson, S Crane, P Larsen… - Proceedings of the …, 2022 - dl.acm.org
After more than twenty-five years of research, memory safety violations remain one of the
major causes of security vulnerabilities in real-world software. Memory-safe languages, like …

Principles and implementation techniques of software-based fault isolation

G Tan - Foundations and Trends® in Privacy and Security, 2017 - nowpublishers.com
When protecting a computer system, it is often necessary to isolate an untrusted component
into a separate protection domain and provide only controlled interaction between the …

You shall not (by) pass! practical, secure, and fast pku-based sandboxing

A Voulimeneas, J Vinck, R Mechelinck… - Proceedings of the …, 2022 - dl.acm.org
Memory Protection Keys for Userspace (PKU) is a recent hardware feature that allows
programs to assign virtual memory pages to protection domains, and to change domain …

Flightplan: Dataplane disaggregation and placement for p4 programs

N Sultana, J Sonchack, H Giesen, I Pedisich… - … USENIX Symposium on …, 2021 - usenix.org
Today's dataplane programming approach maps a whole P4 program to a single dataplane
target, limiting a P4 program's performance and functionality to what a single target can offer …

Retrofitting fine grain isolation in the Firefox renderer

S Narayan, C Disselkoen, T Garfinkel, N Froyd… - 29th USENIX Security …, 2020 - usenix.org
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …

Dynpta: Combining static and dynamic analysis for practical selective data protection

T Palit, JF Moon, F Monrose… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …

Too afraid to drive: systematic discovery of semantic dos vulnerability in autonomous driving planning under physical-world attacks

Z Wan, J Shen, J Chuang, X Xia, J Garcia, J Ma… - arXiv preprint arXiv …, 2022 - arxiv.org
In high-level Autonomous Driving (AD) systems, behavioral planning is in charge of making
high-level driving decisions such as cruising and stopping, and thus highly securitycritical. In …

{KSplit}: Automating device driver isolation

Y Huang, V Narayanan, D Detweiler, K Huang… - … USENIX Symposium on …, 2022 - usenix.org
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …

Abslearn: a gnn-based framework for aliasing and buffer-size information retrieval

K Liang, J Tan, D Zeng, Y Huang, X Huang… - Pattern Analysis and …, 2023 - Springer
Inferring aliasing and buffer-size information is important to understanding a C program's
memory layout, which is critical to program analysis and security-related tasks. However …

Practical program modularization with type-based dependence analysis

K Lu - 2023 IEEE Symposium on Security and Privacy (SP), 2023 - ieeexplore.ieee.org
Today's software programs are bloating and have become extremely complex. As there is
typically no internal isolation among modules in a program, a vulnerability can be exploited …