Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …
arbitrary program data under malicious speculation, and later exfiltrating that data over …
Improving software diagnosability via log enhancement
D Yuan, J Zheng, S Park, Y Zhou… - ACM Transactions on …, 2012 - dl.acm.org
Diagnosing software failures in the field is notoriously difficult, in part due to the fundamental
complexity of troubleshooting any complex software system, but further exacerbated by the …
complexity of troubleshooting any complex software system, but further exacerbated by the …
HDFI: Hardware-assisted data-flow isolation
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …
defense mechanisms are inadequate; in general, the software-based approaches are not …
Challenges and opportunities for practical and effective dynamic information flow tracking
Information flow tracking was proposed more than 40 years ago to address the limitations of
access control mechanisms to guarantee the confidentiality and integrity of information …
access control mechanisms to guarantee the confidentiality and integrity of information …
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple
bugs (ie, accesses to an object after deallocation) to become the root cause of exploitable …
bugs (ie, accesses to an object after deallocation) to become the root cause of exploitable …
Architectural support for software-defined metadata processing
Optimized hardware for propagating and checking software-programmable metadata tags
can achieve low runtime overhead. We generalize prior work on hardware tagging by …
can achieve low runtime overhead. We generalize prior work on hardware tagging by …
{CleanOS}: Limiting Mobile Data Exposure with Idle Eviction
Mobile-device theft and loss have reached gigantic proportions. Despite these threats,
today's mobile devices are saturated with sensitive information due to operating systems that …
today's mobile devices are saturated with sensitive information due to operating systems that …
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
Security violations are becoming more common in real-time systems-an area that was
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …
Watchdoglite: Hardware-accelerated compiler-based pointer checking
Lack of memory safety in C is the root cause of a multitude of serious bugs and security
vulnerabilities. Numerous software-only and hardware-based schemes have been proposed …
vulnerabilities. Numerous software-only and hardware-based schemes have been proposed …