Intel mpx explained: A cross-layer analysis of the intel mpx system stack

O Oleksenko, D Kuvaiskii, P Bhatotia, P Felber… - Proceedings of the …, 2018 - dl.acm.org
Memory-safety violations are the primary cause of security and reliability issues in software
systems written in unsafe languages. Given the limited adoption of decades-long research in …

SGXBOUNDS: Memory safety for shielded execution

D Kuvaiskii, O Oleksenko, S Arnautov, B Trach… - Proceedings of the …, 2017 - dl.acm.org
Shielded execution based on Intel SGX provides strong security guarantees for legacy
applications running on untrusted platforms. However, memory safety attacks such as …

Securing smart contract with runtime validation

A Li, JA Choi, F Long - Proceedings of the 41st ACM SIGPLAN …, 2020 - dl.acm.org
We present Solythesis, a source to source Solidity compiler which takes a smart contract
code and a user specified invariant as the input and produces an instrumented contract that …

Dynpta: Combining static and dynamic analysis for practical selective data protection

T Palit, JF Moon, F Monrose… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …

Journey beyond full abstraction: Exploring robust property preservation for secure compilation

C Abate, R Blanco, D Garg, C Hritcu… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Good programming languages provide helpful abstractions for writing secure code, but the
security properties of the source language are generally not preserved when compiling a …

{FloatZone}: Accelerating Memory Error Detection using the Floating Point Unit

F Gorter, E Barberis, R Isemann… - 32nd USENIX Security …, 2023 - usenix.org
Memory sanitizers are powerful tools to detect spatial and temporal memory errors, such as
buffer overflows and use-after-frees. Fuzzers and software testers often rely on these tools to …

Datashield: Configurable data confidentiality and integrity

SA Carr, M Payer - Proceedings of the 2017 ACM on Asia Conference …, 2017 - dl.acm.org
Applications written in C/C++ are prone to memory corruption, which allows attackers to
extract secrets or gain control of the system. With the rise of strong control-flow hijacking …

Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

Bogo: Buy spatial memory safety, get temporal memory safety (almost) free

T Zhang, D Lee, C Jung - Proceedings of the Twenty-Fourth International …, 2019 - dl.acm.org
A memory safety violation occurs when a program has an out-of-bound (spatial safety) or
use-after-free (temporal safety) memory access. Given its importance as a security …

Enforcing least privilege memory views for multithreaded applications

TCH Hsu, K Hoffman, P Eugster, M Payer - Proceedings of the 2016 …, 2016 - dl.acm.org
Failing to properly isolate components in the same address space has resulted in a
substantial amount of vulnerabilities. Enforcing the least privilege principle for memory …