Hardware security features need to strike a careful balance between design intrusiveness and completeness of methods. Securing against attacks like Return Oriented Programming (ROP) requires frequent and expensive checks. Complete security defenses have been proposed yet modern systems are still vulnerable to ROP attacks. We provide complete security by decomposing the solution into two stages. The first stage raises alarms based on an imprecise, low cost hardware detector. The second stage applies complete methods in order to accurately distinguish real attacks from false alarms. This decomposition is enabled with Record and Deterministic Replay. The original execution is recorded and subjected to replay analysis as alarms are raised. In t...
While research into building robust and survivable networks has steadily intensified in recent years...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Hardware-assisted Record and Deterministic Replay (RnR) of programs has been proposed as a primitive...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer sys...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Log-based recovery and replay systems are important for system reliability, debugging and postmortem...
While research into building robust and survivable networks has steadily intensified in recent years...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Hardware-assisted Record and Deterministic Replay (RnR) of programs has been proposed as a primitive...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer sys...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Log-based recovery and replay systems are important for system reliability, debugging and postmortem...
While research into building robust and survivable networks has steadily intensified in recent years...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
Hardware-assisted Record and Deterministic Replay (RnR) of programs has been proposed as a primitive...