[PDF][PDF] Preventing Kernel Hacks with HAKCs.

DP McKee, Y Giannaris, C Ortega, HE Shrobe… - NDSS, 2022 - ndss-symposium.org
Commodity operating system kernels remain monolithic for practical and historical reasons.
All kernel code shares a single address space, executes with elevated processor privileges …

Intel mpx explained: A cross-layer analysis of the intel mpx system stack

O Oleksenko, D Kuvaiskii, P Bhatotia, P Felber… - Proceedings of the …, 2018 - dl.acm.org
Memory-safety violations are the primary cause of security and reliability issues in software
systems written in unsafe languages. Given the limited adoption of decades-long research in …

Pacmem: Enforcing spatial and temporal memory safety via arm pointer authentication

Y Li, W Tan, Z Lv, S Yang, M Payer, Y Liu… - Proceedings of the 2022 …, 2022 - dl.acm.org
Memory safety is a key security property that stops memory corruption vulnerabilities.
Different types of memory safety enforcement solutions have been proposed and adopted by …

Exploitation techniques for data-oriented attacks with existing and potential defense approaches

L Cheng, S Ahmed, H Liljestrand, T Nyman… - ACM Transactions on …, 2021 - dl.acm.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

[PDF][PDF] Cross-Language Attacks.

S Mergendahl, N Burow, H Okhravi - NDSS, 2022 - ndss-symposium.org
Memory corruption attacks against unsafe programming languages like C/C++ have been a
major threat to computer systems for multiple decades. Various sanitizers and runtime …

Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis

R Guanciale, M Balliu, M Dam - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
The recent Spectre attacks have demonstrated the fundamental insecurity of current
computer microarchitecture. The attacks use features like pipelining, out-of-order and …

{TRust}: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code

I Bang, M Kayondo, H Moon, Y Paek - 32nd USENIX Security …, 2023 - usenix.org
Rust was invented to help developers build highly safe systems. It comes with a variety of
programming constructs that put emphasis on safety and control of memory layout. Rust …

Skybridge: Fast and secure inter-process communication for microkernels

Z Mi, D Li, Z Yang, X Wang, H Chen - Proceedings of the Fourteenth …, 2019 - dl.acm.org
Microkernels have been extensively studied over decades. However, IPC (Inter-Process
Communication) is still a major factor of runtime overhead, where fine-grained isolation …

Cubicleos: A library os with software componentisation for practical isolation

VA Sartakov, L Vilanova, P Pietzuch - Proceedings of the 26th ACM …, 2021 - dl.acm.org
Library OSs have been proposed to deploy applications isolated inside containers, VMs, or
trusted execution environments. They often follow a highly modular design in which third …

Going beyond the limits of sfi: Flexible and secure hardware-assisted in-process isolation with hfi

S Narayan, T Garfinkel, M Taram, J Rudek… - Proceedings of the 28th …, 2023 - dl.acm.org
We introduce Hardware-assisted Fault Isolation (HFI), a simple extension to existing
processors to support secure, flexible, and efficient in-process isolation. HFI addresses the …