S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022 - dl.acm.org
Software security defenses are routinely broken by the persistence of both security researchers and attackers. Hardware solutions based on tagging are emerging as a …
Optimized hardware for propagating and checking software-programmable metadata tags can achieve low runtime overhead. We generalize prior work on hardware tagging by …
A Joannou, J Woodruff, R Kovacsics… - … on Computer Design …, 2017 - ieeexplore.ieee.org
We characterize the cache behavior of an in-memory tag table and demonstrate that an optimized implementation can typically achieve a near-zero memory traffic overhead. Both …
J Song, J Alves-Foss - 2013 46th Hawaii International …, 2013 - ieeexplore.ieee.org
Hardware-based security tagging schemes are promising mechanisms for enhancing the security of computer systems. The idea behind security tagging schemes is to attach labels …
The rise of code reuse attacks has been devastating for users of languages like C and C++ that lack memory safety. We survey existing defenses to understand why none are generally …
Control flow attacks exploit software vulnerabilities to divert the flow of control into unintended paths such that the program behavior is altered to ultimately execute the code …