Threat detection and investigation with system-level provenance graphs: A survey

Z Li, QA Chen, R Yang, Y Chen, W Ruan - Computers & Security, 2021 - Elsevier
With the development of information technology, the border of the cyberspace gets much
broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …

Control-flow integrity principles, implementations, and applications

M Abadi, M Budiu, U Erlingsson, J Ligatti - ACM Transactions on …, 2009 - dl.acm.org
Current software attacks often build on exploits that subvert machine-code execution. The
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …

SWIFT: Software implemented fault tolerance

GA Reis, J Chang, N Vachharajani… - … symposium on Code …, 2005 - ieeexplore.ieee.org
To improve performance and reduce power, processor designers employ advances that
shrink feature sizes, lower voltage levels, reduce noise margins, and increase clock rates …

Demystifying the system vulnerability stack: Transient fault effects across the layers

G Papadimitriou, D Gizopoulos - 2021 ACM/IEEE 48th Annual …, 2021 - ieeexplore.ieee.org
In this paper, we revisit the system vulnerability stack for transient faults. We reveal severe
pitfalls in widely used vulnerability measurement approaches, which separate the hardware …

Reliable on-chip systems in the nano-era: Lessons learnt and future trends

J Henkel, L Bauer, N Dutt, P Gupta, S Nassif… - Proceedings of the 50th …, 2013 - dl.acm.org
Reliability concerns due to technology scaling have been a major focus of researchers and
designers for several technology nodes. Therefore, many new techniques for enhancing and …

Understanding the propagation of hard errors to software and implications for resilient system design

ML Li, P Ramachandran, SK Sahoo, SV Adve… - ACM Sigplan …, 2008 - dl.acm.org
With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-
the-field faults. To be broadly deployable, the hardware reliability solution must incur low …

Design and evaluation of hybrid fault-detection systems

GA Reis, J Chang, N Vachharajani… - 32nd International …, 2005 - ieeexplore.ieee.org
As chip densities and clock rates increase, processors are becoming more susceptible to
transient faults that can affect program correctness. Up to now, system designers have …

A review of approximate computing techniques towards fault mitigation in HW/SW systems

A Aponte-Moreno, A Moncada… - 2018 IEEE 19th Latin …, 2018 - ieeexplore.ieee.org
Technological scaling has increased the susceptibility of logic circuits to radiation-induced
transient faults, making digital devices less reliable. Although different techniques have …

Software-controlled fault tolerance

GA Reis, J Chang, N Vachharajani, R Rangan… - ACM Transactions on …, 2005 - dl.acm.org
Traditional fault-tolerance techniques typically utilize resources ineffectively because they
cannot adapt to the changing reliability and performance demands of a system. This paper …

Using likely program invariants to detect hardware errors

SK Sahoo, ML Li, P Ramachandran… - … and Networks With …, 2008 - ieeexplore.ieee.org
In the near future, hardware is expected to become increasingly vulnerable to faults due to
continuously decreasing feature size. Software-level symptoms have previously been used …