We propose a new formal criterion for evaluating secure compilation schemes for unsafe languages, expressing end-to-end security guarantees for software components that may …
H Lee, C Song, BB Kang - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Modern applications often involve processing of sensitive information. However, the lack of privilege separation within the user space leaves sensitive application secret such as …
T Letan, Y Régis-Gianas, P Chifflier, G Hiet - … , FM 2018, Held as Part of the …, 2018 - Springer
Modern computing systems have grown in complexity, and the attack surface has increased accordingly. Even though system components are generally carefully designed and even …
M Taram, A Venkat, D Tullsen - 2018 ACM/IEEE 45th Annual …, 2018 - ieeexplore.ieee.org
Modern instruction set decoders feature translation of native instructions into internal micro- ops to simplify CPU design and improve instruction-level parallelism. However, this …
D Zeng, G Tan - Proceedings of the Eighth ACM Conference on Data …, 2018 - dl.acm.org
Binary-level Control-Flow Graph (CFG) construction is essential for applications such as control-flow integrity. There are two main approaches: the binary-analysis approach and the …
G Tan, G Morrisett - Journal of Automated Reasoning, 2018 - Springer
Binary analysis, which analyzes machine code, requires a decoder for converting bits into abstract syntax of machine instructions. Binary rewriting requires an encoder for converting …
Abstract Software Fault Isolation (SFI) consists in transforming untrusted code so that it runs within a specific address space,(called the sandbox) and verifying at load-time that the …
R Guanciale - Secure IT Systems: 23rd Nordic Conference, NordSec …, 2018 - Springer
Abstract Instruction Set Randomization (ISR) prevents code injection by randomizing the instruction encoding used by programs, thus preventing an attacker from preparing a …
A Coglio, S Goel - arXiv preprint arXiv:1810.04313, 2018 - arxiv.org
The ACL2 model of the x86 Instruction Set Architecture was built for the 64-bit mode of operation of the processor. This paper reports on our work to extend the model with support …