Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Tag: Tagged architecture guide

S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022 - dl.acm.org
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …

Architectural support for software-defined metadata processing

U Dhawan, C Hritcu, R Rubin, N Vasilakis… - Proceedings of the …, 2015 - dl.acm.org
Optimized hardware for propagating and checking software-programmable metadata tags
can achieve low runtime overhead. We generalize prior work on hardware tagging by …

Efficient tagged memory

A Joannou, J Woodruff, R Kovacsics… - … on Computer Design …, 2017 - ieeexplore.ieee.org
We characterize the cache behavior of an in-memory tag table and demonstrate that an
optimized implementation can typically achieve a near-zero memory traffic overhead. Both …

Security tagging for a zero-kernel operating system

J Song, J Alves-Foss - 2013 46th Hawaii International …, 2013 - ieeexplore.ieee.org
Hardware-based security tagging schemes are promising mechanisms for enhancing the
security of computer systems. The idea behind security tagging schemes is to attach labels …

High-performance memory safety: optimizing the CHERI capability machine

AJP Joannou - 2019 - cl.cam.ac.uk
High-performance memory safety: optimizing the CHERI capability machine Page 1 Technical
Report Number 936 Computer Laboratory UCAM-CL-TR-936 ISSN 1476-2986 High-performance …

Taxi: Defeating code reuse attacks with tagged memory

JA González - 2015 - dspace.mit.edu
The rise of code reuse attacks has been devastating for users of languages like C and C++
that lack memory safety. We survey existing defenses to understand why none are generally …

[PDF][PDF] TAG: Tagged Architecture Guide

H SHROBE - ACM Comput. Surv, 2022 - sjero.net
Authors' addresses: Samuel Jero, samuel. jero@ ll. mit. edu; Nathan Burow, nathan.
burow@ ll. mit. edu; Bryan Ward, bryan. ward@ ll. mit. edu; Richard Skowyra, richard …

Security Tagged Architectures and Systems

G Yuksek - 2024 - search.proquest.com
Control flow attacks exploit software vulnerabilities to divert the flow of control into
unintended paths such that the program behavior is altered to ultimately execute the code …

High-performance memory safety-Optimizing the CHERI capability machine

AJMP Joannou - 2018 - repository.cam.ac.uk
High-performance memory safety Optimizing the CHERI capability machine Alexandre Jean-Michel
Procopi Joannou University of Cambr Page 1 High-performance memory safety Optimizing the …