Shreds: Fine-Grained Execution Units with Private Memory
暂无分享,去创建一个
Long Lu | Yaohui Chen | Zhichuang Sun | Sebassujeen Reymondjohnson | Long Lu | Yaohui Chen | Zhichuang Sun | Sebassujeen Reymondjohnson
[1] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[2] Jing Wang,et al. Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory , 2015, 2015 IEEE Symposium on Security and Privacy.
[3] Frank Piessens,et al. Fides: selectively hardening software application components against kernel-level or process-level malware , 2012, CCS '12.
[4] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Peng Ning,et al. SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.
[6] Christoforos E. Kozyrakis,et al. Usenix Association 10th Usenix Symposium on Operating Systems Design and Implementation (osdi '12) 335 Dune: Safe User-level Access to Privileged Cpu Features , 2022 .
[7] Andreas Dewald,et al. TRESOR Runs Encryption Securely Outside RAM , 2011, USENIX Security Symposium.
[8] Sotiris Ioannidis,et al. PixelVault: Using GPUs for Securing Cryptographic Operations , 2014, CCS.
[9] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[10] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[11] Jingqiang Lin,et al. Copker: Computing with Private Keys without RAM , 2014, NDSS.
[12] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[13] Mark Handley,et al. Wedge: Splitting Applications into Reduced-Privilege Compartments , 2008, NSDI.
[14] David Brumley,et al. Privtrans: Automatically Partitioning Programs for Privilege Separation , 2004, USENIX Security Symposium.
[15] Bryan Ford,et al. Vx32: Lightweight User-level Sandboxing on the x86 , 2008, USENIX Annual Technical Conference.
[16] Vern Paxson,et al. The Matter of Heartbleed , 2014, Internet Measurement Conference.
[17] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[18] Peter G. Neumann,et al. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization , 2015, 2015 IEEE Symposium on Security and Privacy.
[19] Douglas Kilpatrick,et al. Privman: A Library for Partitioning Applications , 2003, USENIX Annual Technical Conference, FREENIX Track.
[20] Shouhuai Xu,et al. Protecting Cryptographic Keys from Memory Disclosure Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[21] G. Edward Suh,et al. Efficient Memory Integrity Verification and Encryption for Secure Processors , 2003, MICRO.
[22] Yue Chen,et al. ARMlock: Hardware-based Fault Isolation for ARM , 2014, CCS.
[23] Dawn Xiaodong Song,et al. TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.
[24] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[25] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[26] Yutao Liu,et al. Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation , 2015, CCS.
[27] Miguel Castro,et al. Fast byte-granularity software fault isolation , 2009, SOSP '09.
[28] Robert N. M. Watson,et al. Capsicum: Practical Capabilities for UNIX , 2010, USENIX Security Symposium.
[29] Xiangyu Zhang,et al. iRiS: Vetting Private API Abuse in iOS Applications , 2015, CCS.
[30] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[31] Bennet S. Yee,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[32] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[33] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[34] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.