Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019 - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

Improving software diagnosability via log enhancement

D Yuan, J Zheng, S Park, Y Zhou… - ACM Transactions on …, 2012 - dl.acm.org
Diagnosing software failures in the field is notoriously difficult, in part due to the fundamental
complexity of troubleshooting any complex software system, but further exacerbated by the …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …

Challenges and opportunities for practical and effective dynamic information flow tracking

C Brant, P Shrestha, B Mixon-Baca, K Chen… - ACM Computing …, 2021 - dl.acm.org
Information flow tracking was proposed more than 40 years ago to address the limitations of
access control mechanisms to guarantee the confidentiality and integrity of information …

Watchdog: Hardware for safe and secure manual memory management and full memory safety

S Nagarakatte, MMK Martin, S Zdancewic - ACM SIGARCH Computer …, 2012 - dl.acm.org
Languages such as C and C++ use unsafe manual memory management, allowing simple
bugs (ie, accesses to an object after deallocation) to become the root cause of exploitable …

Architectural support for software-defined metadata processing

U Dhawan, C Hritcu, R Rubin, N Vasilakis… - Proceedings of the …, 2015 - dl.acm.org
Optimized hardware for propagating and checking software-programmable metadata tags
can achieve low runtime overhead. We generalize prior work on hardware tagging by …

{CleanOS}: Limiting Mobile Data Exposure with Idle Eviction

Y Tang, P Ames, S Bhamidipati, A Bijlani… - … USENIX Symposium on …, 2012 - usenix.org
Mobile-device theft and loss have reached gigantic proportions. Despite these threats,
today's mobile devices are saturated with sensitive information due to operating systems that …

SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems

MK Yoon, S Mohan, J Choi, JE Kim… - 2013 IEEE 19th Real …, 2013 - ieeexplore.ieee.org
Security violations are becoming more common in real-time systems-an area that was
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …

Watchdoglite: Hardware-accelerated compiler-based pointer checking

S Nagarakatte, MMK Martin, S Zdancewic - Proceedings of Annual IEEE …, 2014 - dl.acm.org
Lack of memory safety in C is the root cause of a multitude of serious bugs and security
vulnerabilities. Numerous software-only and hardware-based schemes have been proposed …