Memory corruption vulnerabilities are the root cause of many modern attacks. Existing defense mechanisms are inadequate; in general, the software-based approaches are not efficient and the hardware-based approaches are not flexible. In this paper, we present hardware-assisted data-flow isolation, or, HDFI, a new fine-grained data isolation mechanism that is broadly applicable and very efficient. HDFI enforces isolation at the machine word granularity by virtually extending each memory unit with an additional tag that is defined by dataflow. This capability allows HDFI to enforce a variety of security models such as the Biba Integrity Model and the Bell -- LaPadula Model. We implemented HDFI by extending the RISC-V instruction set architectu...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Secure processors have been recently introduced, which enable new applications involving software an...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The emergence of Real-Time Systems with increased connections to their environment has led to a grea...
International audienceComputing devices became part of our daily world. But being physically accessi...
Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software on...
Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software on...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software o...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
We consider the problem of how to provide an execution environment where the application's secrets a...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Secure processors have been recently introduced, which enable new applications involving software an...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The emergence of Real-Time Systems with increased connections to their environment has led to a grea...
International audienceComputing devices became part of our daily world. But being physically accessi...
Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software on...
Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software on...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Computer security is a very critical problem these days, as it has widespread consequences in case o...
Code-reuse attacks like return-oriented programming (ROP) pose a severe threat to modern software o...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
We consider the problem of how to provide an execution environment where the application's secrets a...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Secure processors have been recently introduced, which enable new applications involving software an...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...