Revisiting challenges for selective data protection of real applications
暂无分享,去创建一个
Kui Ren | Wenbo Shen | Yajin Zhou | Jiadong Sun | Rui Chang | Lin Ma | Jinyan Xu | Xun Xie | Yajin Zhou | K. Ren | Wenbo Shen | Jinyan Xu | Jiadong Sun | Rui Chang | Lin Ma | Xun Xie
[1] Yunheung Paek,et al. HDFI: Hardware-Assisted Data-Flow Isolation , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[2] Frank Piessens,et al. Breaking the memory secrecy assumption , 2009, EUROSEC '09.
[3] Thomas F. Knight,et al. Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA) , 2009 .
[4] Kui Wang,et al. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication , 2018, USENIX Security Symposium.
[5] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[6] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[7] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[8] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[9] Mathias Payer,et al. DataShield: Configurable Data Confidentiality and Integrity , 2017, AsiaCCS.
[10] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[11] Jonathan M. Smith,et al. Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security , 2013, CCS.
[12] Jonathan M. Smith,et al. PUMP: a programmable unit for metadata processing , 2014, HASP@ISCA.
[13] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[14] Christoforos E. Kozyrakis,et al. Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[15] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[16] Aseem Rastogi,et al. ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code , 2019, EuroSys.
[17] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[18] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[19] Sharad Malik,et al. Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn , 2019, ASPLOS.
[20] Todd M. Austin,et al. A case for unlimited watchpoints , 2012, ASPLOS XVII.
[21] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[22] Bruce Jacob,et al. DRAMsim3: A Cycle-Accurate, Thermal-Capable DRAM Simulator , 2020, IEEE Computer Architecture Letters.
[23] Michael Hind,et al. Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.
[24] Peter G. Neumann,et al. Efficient Tagged Memory , 2017, 2017 IEEE International Conference on Computer Design (ICCD).
[25] Ahmad-Reza Sadeghi,et al. TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V , 2019, NDSS.
[26] Edward A. Feustel,et al. On The Advantages of Tagged Architecture , 1973, IEEE Transactions on Computers.
[27] Lin Zhong,et al. Ginseng: Keeping Secrets in Registers When You Distrust the Operating System , 2019, NDSS.
[28] Michalis Polychronakis,et al. Mitigating data leakage by protecting memory-resident sensitive data , 2019, ACSAC.
[29] André DeHon,et al. Protecting the Stack with Metadata Policies and Tagged Hardware , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[30] Roberto Avanzi,et al. The QARMA Block Cipher Family , 2017 .
[31] Gavin Ferris,et al. Tagged memory and minion cores in the lowRISC SoC , 2014 .