Sok: Runtime integrity
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
On bridging the gap between control flow integrity and attestation schemes
M Ammar, A Abdelraoof, S Vlasceanu - 33rd USENIX Security …, 2024 - usenix.org
Control-flow hijacking attacks are still a major challenge in software security. Several means
of protection and detection have been proposed but gaps still exist. To bridge such gaps …
of protection and detection have been proposed but gaps still exist. To bridge such gaps …
SoK: Integrity, Attestation, and Auditing of Program Execution
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
{DMAAUTH}: A Lightweight Pointer Integrity-based Secure Architecture to Defeat {DMA} Attacks
IOMMU has been introduced to thwart DMA attacks. However, the performance degradation
prevents it from being enabled on most systems. Even worse, recent studies show that …
prevents it from being enabled on most systems. Even worse, recent studies show that …
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against {Data-Oriented} Attacks
Data-oriented attacks are becoming increasingly realistic and effective against the state-of-
the-art defenses in most operating systems. These attacks manipulate memory-resident data …
the-art defenses in most operating systems. These attacks manipulate memory-resident data …
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures
In-process compartmentalization and access control have been actively explored to provide
in-place and efficient isolation of in-process security domains. Many works have proposed …
in-place and efficient isolation of in-process security domains. Many works have proposed …
Cryptographically Enforced Memory Safety
M Unterguggenberger, D Schrammel… - Proceedings of the …, 2023 - dl.acm.org
C/C++ memory safety issues, such as out-of-bounds errors, are still prevalent in today's
applications. The presence of a single exploitable software bug allows an adversary to gain …
applications. The presence of a single exploitable software bug allows an adversary to gain …
PANIC: PAN-assisted Intra-process Memory Isolation on ARM
Intra-process memory isolation is a well-known technique to enforce least privilege within a
process. In this paper, we propose a generic and efficient intra-process memory isolation …
process. In this paper, we propose a generic and efficient intra-process memory isolation …
[PDF][PDF] Demystifying Pointer Authentication on Apple M1.
Zechao Cai1,2, Jiaxun Zhu1,2, Wenbo Shen1,2, , Yutian Yang1,2, Rui Chang1,2, Yu Wang3,
Jinku Li4, and Kui Ren1,2 Page 1 Demystifying Pointer Authentication on Apple M1 Zechao …
Jinku Li4, and Kui Ren1,2 Page 1 Demystifying Pointer Authentication on Apple M1 Zechao …
{HIVE}: A Hardware-assisted Isolated Execution Environment for {eBPF} on {AArch64}
eBPF has become a critical component in Linux. To ensure kernel security, BPF programs
are statically verified before being loaded and executed in the kernel. However, the state-of …
are statically verified before being loaded and executed in the kernel. However, the state-of …