Intel MPX Explained: A Cross-layer Analysis of the Intel MPX System Stack
暂无分享,去创建一个
Christof Fetzer | Pascal Felber | Pramod Bhatotia | Oleksii Oleksenko | Dmitrii Kuvaiskii | Pramod Bhatotia | P. Felber | C. Fetzer | Dmitrii Kuvaiskii | O. Oleksenko
[1] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[2] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[3] Christof Fetzer,et al. Intel MPX Explained , 2018, Proc. ACM Meas. Anal. Comput. Syst..
[4] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[5] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[6] Mathias Payer,et al. DataShield: Configurable Data Confidentiality and Integrity , 2017, AsiaCCS.
[7] Christof Fetzer,et al. SGXBOUNDS: Memory Safety for Shielded Execution , 2017, EuroSys.
[8] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[9] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[10] Xi Chen,et al. No Need to Hide: Protecting Safe Regions on Commodity Hardware , 2017, EuroSys.
[11] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[12] George Candea,et al. Code-pointer integrity , 2014, OSDI.