Mempol: policing core memory bandwidth from outside of the cores

A Zuepke, A Bastoni, W Chen… - 2023 IEEE 29th Real …, 2023 - ieeexplore.ieee.org
In today's multiprocessor systems-on-a-chip (MP-SoC), the shared memory subsystem is a
known source of temporal interference. The problem causes logically independent cores to …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

SyzTrust: State-aware fuzzing on trusted OS designed for IoT devices

Q Wang, B Chang, S Ji, Y Tian, X Zhang… - arXiv preprint arXiv …, 2023 - arxiv.org
Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable
solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted …

Hyperdbg: Reinventing hardware-assisted debugging

MS Karvandi, MH Gholamrezaei… - Proceedings of the …, 2022 - dl.acm.org
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …

[HTML][HTML] MemPol: polling-based microsecond-scale per-core memory bandwidth regulation

A Zuepke, A Bastoni, W Chen, M Caccamo… - Real-Time …, 2024 - Springer
In today's multiprocessor systems-on-a-chip, the shared memory subsystem is a known
source of temporal interference. The problem causes logically independent cores to affect …

Processor Vulnerability Discovery

Y Lyu, R Sun, G Qu - 2023 60th ACM/IEEE Design Automation …, 2023 - ieeexplore.ieee.org
Processor security vulnerability discovery has drawn increasing attention since the
disclosure of Meltdown, Spectre and other vulnerabilities. This paper presents a concise …

HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)

MS Karvandi, MH Gholamrezaei, SK Monfared… - arXiv preprint arXiv …, 2022 - arxiv.org
Software analysis, debugging, and reverse engineering have a crucial impact in today's
software industry. Efficient and stealthy debuggers are especially relevant for malware …

[PDF][PDF] SoK: A Comparison Study of Arm TrustZone and CCA

H Huang, F Zhang, S Yan, T Wei, Z He - cse.sustech.edu.cn
Arm TrustZone is the most popular hardwareassisted Trusted Execution Environment (TEE)
solution on mobile and Internet of Things (IoT) devices. However, this wellestablished TEE …

[PDF][PDF] RetrofittingRemoteControl-FlowAttestationforARMTrustZone ErweiterungvonARMTrustZoneumKontrollflussAttestierung

I Eisenbarth - its.uni-luebeck.de
In dieser Arbeit wird ein hardwaregestütztes Kontrollfluss-Attestierungsverfahren für
TrustZone vorgestellt, das auf den vorhandenen Debugging-Fähigkeiten des Prozessors …