J Gu, H Li, W Li, Y Xia, H Chen - 2022 USENIX Annual Technical …, 2022 - usenix.org
As a hardware mechanism for facilitating intra-process memory isolation, Intel Memory Protection Keys (MPK) has been leveraged to efficiently improve the isolation, security, or …
We introduce Hardware-assisted Fault Isolation (HFI), a simple extension to existing processors to support secure, flexible, and efficient in-process isolation. HFI addresses the …
Isolating application components is crucial to limit the exposure of sensitive data and code to vulnerabilities in the untrusted components. Process-based isolation is the de facto isolation …
H Lei, Z Zhang, S Zhang, P Jiang, Z Zhong… - Proceedings of the …, 2023 - dl.acm.org
Memory corruption vulnerabilities can have more serious consequences in WebAssembly than in native applications. Therefore, we present\tool, the first WebAssembly runtime with …
K Dinh Duy, K Cho, T Noh, H Lee - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In-process compartmentalization and access control have been actively explored to provide in-place and efficient isolation of in-process security domains. Many works have proposed …
Software diversification is one of the most effective ways to defeat memory corruption based attacks. Traditional software diversification such as code randomization techniques …
S Park, S Lee, T Kim - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
Memory Protection Keys (MPK) offers per-thread memory protection with an affordable overhead, prompting many new studies. With protection key extension, MPK provides more …
Well-known defenses exist to detect and mitigate common faults and memory safety vulnerabilities in software. Yet, many of these mitigations do not address the challenge of …
Software is becoming increasingly complex and feature-rich, yet only part of any given codebase is frequently used. Existing software customization and debloating approaches …