Tag: Tagged architecture guide

S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022 - dl.acm.org
Software security defenses are routinely broken by the persistence of both security
researchers and attackers. Hardware solutions based on tagging are emerging as a …

Column-associative caches: A technique for reducing the miss rate of direct-mapped caches

A Agarwal, SD Pudar - Proceedings of the 20th annual international …, 1993 - dl.acm.org
Direct-mapped caches are a popular design choice for highperfortnsnce processors;
unfortunately, direct-mapped cachessuffer systematic interference misses when more than …

Efficient tagged memory

A Joannou, J Woodruff, R Kovacsics… - … on Computer Design …, 2017 - ieeexplore.ieee.org
We characterize the cache behavior of an in-memory tag table and demonstrate that an
optimized implementation can typically achieve a near-zero memory traffic overhead. Both …

Memory protection with hidden inline metadata

DM Durham, R Gabor - US Patent 11,288,213, 2022 - Google Patents
Embodiments are directed to memory protection with hid den inline metadata. An
embodiment of an apparatus includes processor cores; a computer memory for the storage …

[PDF][PDF] Pointer tagging for memory safety

T Chen, D Chisnall - Microsoft. Retrieved from https://www. microsoft …, 2019 - microsoft.com
Memory safety attacks continue to be prevalent on computer systems in use today, as large
amounts of unsafe C/C++ code continues to provide attackers with a large supply of buffer …

Survey of protections from buffer-overflow attacks

K Piromsopa, RJ Enbody - Engineering Journal, 2011 - engj.org
Buffer-overflow attacks began two decades ago and persist today. Over that time, many
solutions to provide protection from buffer-overflow attacks have been proposed by a …

Integrity protection method and apparatus for mobile terminal

KIM Bumhan, YOO Sunghoon, K Lee - US Patent 9,235,709, 2016 - Google Patents
Aspects of the present invention are to address at least the above-mentioned problems
and/or disadvantages and to pro vide at least the advantages described below. Accordingly …

Buffer-overflow protection: the theory

K Piromsopa, RJ Enbody - 2006 IEEE International Conference …, 2006 - ieeexplore.ieee.org
We propose a framework for protecting against buffer overflow attacks $ the oldest and most
pervasive attack technique. The malicious nature of buffer-overflow attacks is the use of …

An efficient hardware-oriented runtime approach for stack-based software buffer overflow attacks

LK Sah, SA Islam, S Katkoori - 2018 Asian Hardware Oriented …, 2018 - ieeexplore.ieee.org
Software countermeasures to mitigate buffer overflow attacks suffer from excessive memory
and/or performance overhead. With such overhead, the defender can use software-only …

Systematic bug finding and fault localization enhanced with input data tracking

JD DeMott, RJ Enbody, WF Punch - Computers & security, 2013 - Elsevier
Fault localization (FL) is the process of debugging erroneous code and directing analysts to
the root cause of the bug. With this in mind, we have developed a distributed, end-to-end …