Methods for enforcing control flow of a computer program

G Tan, B Niu - US Patent 9,361,102, 2016 - Google Patents
One aspect of the invention provides a method of controlling execution of a computer
program. The method comprises the following runtime steps: parsing code to identify one or …

WaVe: a verifiably secure WebAssembly sandboxing runtime

E Johnson, E Laufer, Z Zhao, D Gohman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …

Speccfi: Mitigating spectre attacks using cfi informed speculation

EM Koruyeh, SHA Shirazi… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Spectre attacks and their many subsequent variants are a new vulnerability class affecting
modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by …

Profile-guided automated software diversity

A Homescu, S Neisius, P Larsen… - Proceedings of the …, 2013 - ieeexplore.ieee.org
Code-reuse attacks are notoriously hard to defeat, and most current solutions to the problem
focus on automated software diversity. This is a promising area of research, as diversity …

RockJIT: Securing just-in-time compilation using modular control-flow integrity

B Niu, G Tan - Proceedings of the 2014 ACM SIGSAC Conference on …, 2014 - dl.acm.org
Managed languages such as JavaScript are popular. For performance, modern
implementations of managed languages adopt Just-In-Time (JIT) compilation. The danger to …

RockSalt: better, faster, stronger SFI for the x86

G Morrisett, G Tan, J Tassarotti, JB Tristan… - Proceedings of the 33rd …, 2012 - dl.acm.org
Software-based fault isolation (SFI), as used in Google's Native Client (NaCl), relies upon a
conceptually simple machine-code analysis to enforce a security policy. But for complicated …

[PDF][PDF] vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.

A Prakash, X Hu, H Yin - NDSS, 2015 - ndss-symposium.org
Control-Flow Integrity (CFI) is an important security property that needs to be enforced to
prevent controlflow hijacking attacks. Recent attacks have demonstrated that existing CFI …

Methods for enforcing control flow of a computer program

G Tan, B Niu - US Patent 9,390,260, 2016 - Google Patents
One aspect of the invention provides a method of controlling execution of a computer
program. The method comprises the following runtime steps: parsing code to identify one or …

{Provably-Safe} multilingual software sandboxing using {WebAssembly}

J Bosamiya, WS Lim, B Parno - 31st USENIX Security Symposium …, 2022 - usenix.org
Many applications, from the Web to smart contracts, need to safely execute untrusted code.
We observe that WebAssembly (Wasm) is ideally positioned to support such applications …

{EPK}: Scalable and Efficient Memory Protection Keys

J Gu, H Li, W Li, Y Xia, H Chen - 2022 USENIX Annual Technical …, 2022 - usenix.org
As a hardware mechanism for facilitating intra-process memory isolation, Intel Memory
Protection Keys (MPK) has been leveraged to efficiently improve the isolation, security, or …