Sok: Runtime integrity

M Ammar, A Caulfield, IDO Nunes - arXiv preprint arXiv:2408.10200, 2024 - arxiv.org
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …

On bridging the gap between control flow integrity and attestation schemes

M Ammar, A Abdelraoof, S Vlasceanu - 33rd USENIX Security …, 2024 - usenix.org
Control-flow hijacking attacks are still a major challenge in software security. Several means
of protection and detection have been proposed but gaps still exist. To bridge such gaps …

SoK: Integrity, Attestation, and Auditing of Program Execution

M Ammar, A Caulfield, IDO Nunes - 2025 IEEE Symposium on …, 2024 - computer.org
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …

{DMAAUTH}: A Lightweight Pointer Integrity-based Secure Architecture to Defeat {DMA} Attacks

X Wang, W Shen, Y Bu, J Zhou, Y Zhou - 33rd USENIX Security …, 2024 - usenix.org
IOMMU has been introduced to thwart DMA attacks. However, the performance degradation
prevents it from being enabled on most systems. Even worse, recent studies show that …

Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against {Data-Oriented} Attacks

S Ahmed, H Liljestrand, H Jamjoom, M Hicks… - 32nd USENIX Security …, 2023 - usenix.org
Data-oriented attacks are becoming increasingly realistic and effective against the state-of-
the-art defenses in most operating systems. These attacks manipulate memory-resident data …

Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures

K Dinh Duy, K Cho, T Noh, H Lee - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In-process compartmentalization and access control have been actively explored to provide
in-place and efficient isolation of in-process security domains. Many works have proposed …

Cryptographically Enforced Memory Safety

M Unterguggenberger, D Schrammel… - Proceedings of the …, 2023 - dl.acm.org
C/C++ memory safety issues, such as out-of-bounds errors, are still prevalent in today's
applications. The presence of a single exploitable software bug allows an adversary to gain …

PANIC: PAN-assisted Intra-process Memory Isolation on ARM

J Xu, M Xie, C Wu, Y Zhang, Q Li, X Huang… - Proceedings of the …, 2023 - dl.acm.org
Intra-process memory isolation is a well-known technique to enforce least privilege within a
process. In this paper, we propose a generic and efficient intra-process memory isolation …

[PDF][PDF] Demystifying Pointer Authentication on Apple M1.

Z Cai, J Zhu, W Shen, Y Yang, R Chang… - USENIX Security …, 2023 - usenix.org
Zechao Cai1,2, Jiaxun Zhu1,2, Wenbo Shen1,2, , Yutian Yang1,2, Rui Chang1,2, Yu Wang3,
Jinku Li4, and Kui Ren1,2 Page 1 Demystifying Pointer Authentication on Apple M1 Zechao …

{HIVE}: A Hardware-assisted Isolated Execution Environment for {eBPF} on {AArch64}

P Zhang, C Wu, X Meng, Y Zhang, M Peng… - 33rd USENIX Security …, 2024 - usenix.org
eBPF has become a critical component in Linux. To ensure kernel security, BPF programs
are statically verified before being loaded and executed in the kernel. However, the state-of …