Bringing the web up to speed with WebAssembly

A Haas, A Rossberg, DL Schuff, BL Titzer… - Proceedings of the 38th …, 2017 - dl.acm.org
The maturation of the Web platform has given rise to sophisticated and demanding Web
applications such as interactive 3D visualization, audio and video software, and games. With …

seL4: Formal verification of an OS kernel

G Klein, K Elphinstone, G Heiser, J Andronick… - Proceedings of the …, 2009 - dl.acm.org
Complete formal verification is the only known way to guarantee that a system is free of
programming errors. We present our experience in performing the formal, machine-checked …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in developing practical tools for comprehensive …

Comprehensive formal verification of an OS microkernel

G Klein, J Andronick, K Elphinstone, T Murray… - ACM Transactions on …, 2014 - dl.acm.org
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …

Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world

AM Azab, P Ning, J Shah, Q Chen, R Bhutkar… - Proceedings of the …, 2014 - dl.acm.org
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-
time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more …

SoftBound: Highly compatible and complete spatial memory safety for C

S Nagarakatte, J Zhao, MMK Martin… - Proceedings of the 30th …, 2009 - dl.acm.org
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …

SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes

A Seshadri, M Luk, N Qu, A Perrig - Proceedings of twenty-first ACM …, 2007 - dl.acm.org
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS
kernels. In particular, SecVisor ensures that only user-approved code can execute in kernel …

KCoFI: Complete control-flow integrity for commodity operating system kernels

J Criswell, N Dautenhahn… - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
We present a new system, KCoFI, that is the first we know of to provide complete Control-
Flow Integrity protection for commodity operating systems without using heavyweight …

Principles and implementation techniques of software-based fault isolation

G Tan - Foundations and Trends® in Privacy and Security, 2017 - nowpublishers.com
When protecting a computer system, it is often necessary to isolate an untrusted component
into a separate protection domain and provide only controlled interaction between the …

[PDF][PDF] Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.

P Akritidis, M Costa, M Castro, S Hand - USENIX Security Symposium, 2009 - usenix.org
Attacks that exploit out-of-bounds errors in C and C++ programs are still prevalent despite
many years of research on bounds checking. Previous backwards compatible bounds …