Donky: Domain Keys–Efficient {In-Process} Isolation for {RISC-V} and x86

D Schrammel, S Weiser, S Steinegger… - 29th USENIX Security …, 2020 - usenix.org
Efficient and secure in-process isolation is in great demand, as evidenced in the shift
towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art …

Retrofitting fine grain isolation in the Firefox renderer

S Narayan, C Disselkoen, T Garfinkel, N Froyd… - 29th USENIX Security …, 2020 - usenix.org
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …

{TeeRex}: Discovery and exploitation of memory corruption vulnerabilities in {SGX} enclaves

T Cloosters, M Rodler, L Davi - 29th USENIX Security Symposium …, 2020 - usenix.org
Intel's Software Guard Extensions (SGX) introduced new instructions to switch the processor
to enclave mode which protects it from introspection. While the enclave mode strongly …

Assessing the impact of interface vulnerabilities in compartmentalized software

H Lefeuvre, VA Bădoiu, Y Chien, F Huici… - arXiv preprint arXiv …, 2022 - arxiv.org
Least-privilege separation decomposes applications into compartments limited to accessing
only what they need. When compartmentalizing existing software, many approaches neglect …

Cali: Compiler-assisted library isolation

M Bauer, C Rossow - Proceedings of the 2021 ACM Asia Conference on …, 2021 - dl.acm.org
Software libraries can freely access the program's entire address space, and also inherit its
system-level privileges. This lack of separation regularly leads to security-critical incidents …

[PDF][PDF] Emilia: Catching Iago in Legacy Code.

R Cui, L Zhao, D Lie - NDSS, 2021 - security.csl.toronto.edu
There has been interest in mechanisms that enable the secure use of legacy code to
implement trusted code in a Trusted Execution Environment (TEE), such as Intel SGX …

Towards (Really) Safe and Fast Confidential I/O

H Lefeuvre, D Chisnall, M Kogias, P Olivier - Proceedings of the 19th …, 2023 - dl.acm.org
Confidential cloud computing enables cloud tenants to distrust their service provider.
Achieving confidential computing solutions that provide concrete security guarantees …

{FlowMatrix}:{GPU-Assisted}{Information-Flow} Analysis through {Matrix-Based} Representation

K Ji, J Zeng, Y Jiang, Z Liang, ZL Chua… - 31st USENIX Security …, 2022 - usenix.org
Dynamic Information Flow Tracking (DIFT) forms the foundation of a wide range of security
and privacy analyses. The main challenges faced by DIFT techniques are performance and …

CIVSCOPE: Analyzing Potential Memory Corruption Bugs in Compartment Interfaces

Y Chien, VA Bădoiu, Y Yang, Y Huo… - Proceedings of the 1st …, 2023 - dl.acm.org
Compartmentalization decomposes a program into separate parts with mediated
interactions through compartment interfaces---hiding information that would otherwise be …

Retrofitting fine grain isolation in the firefox renderer (extended version)

S Narayan, C Disselkoen, T Garfinkel, N Froyd… - arXiv preprint arXiv …, 2020 - arxiv.org
Firefox and other major browsers rely on dozens of third-party libraries to render audio,
video, images, and other content. These libraries are a frequent source of vulnerabilities. To …