You shall not (by) pass! practical, secure, and fast pku-based sandboxing

A Voulimeneas, J Vinck, R Mechelinck… - Proceedings of the …, 2022 - dl.acm.org
Memory Protection Keys for Userspace (PKU) is a recent hardware feature that allows
programs to assign virtual memory pages to protection domains, and to change domain …

{EPK}: Scalable and Efficient Memory Protection Keys

J Gu, H Li, W Li, Y Xia, H Chen - 2022 USENIX Annual Technical …, 2022 - usenix.org
As a hardware mechanism for facilitating intra-process memory isolation, Intel Memory
Protection Keys (MPK) has been leveraged to efficiently improve the isolation, security, or …

Going beyond the limits of sfi: Flexible and secure hardware-assisted in-process isolation with hfi

S Narayan, T Garfinkel, M Taram, J Rudek… - Proceedings of the 28th …, 2023 - dl.acm.org
We introduce Hardware-assisted Fault Isolation (HFI), a simple extension to existing
processors to support secure, flexible, and efficient in-process isolation. HFI addresses the …

μSwitch: Fast Kernel Context Isolation with Implicit Context Switches

D Peng, C Liu, T Palit, P Fonseca… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Isolating application components is crucial to limit the exposure of sensitive data and code to
vulnerabilities in the untrusted components. Process-based isolation is the de facto isolation …

Put your memory in order: Efficient domain-based memory isolation for wasm applications

H Lei, Z Zhang, S Zhang, P Jiang, Z Zhong… - Proceedings of the …, 2023 - dl.acm.org
Memory corruption vulnerabilities can have more serious consequences in WebAssembly
than in native applications. Therefore, we present\tool, the first WebAssembly runtime with …

Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures

K Dinh Duy, K Cho, T Noh, H Lee - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In-process compartmentalization and access control have been actively explored to provide
in-place and efficient isolation of in-process security domains. Many works have proposed …

A framework for software diversification with {ISA} heterogeneity

X Wang, SM Yeoh, R Lyerly, P Olivier, SH Kim… - … on Research in Attacks …, 2020 - usenix.org
Software diversification is one of the most effective ways to defeat memory corruption based
attacks. Traditional software diversification such as code randomization techniques …

Memory protection keys: Facts, key extension perspectives, and discussions

S Park, S Lee, T Kim - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
Memory Protection Keys (MPK) offers per-thread memory protection with an affordable
overhead, prompting many new studies. With protection key extension, MPK provides more …

Rewind & Discard: Improving software resilience using isolated domains

M Gülmez, T Nyman, C Baumann… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
Well-known defenses exist to detect and mitigate common faults and memory safety
vulnerabilities in software. Yet, many of these mitigations do not address the challenge of …

Dynacut: A framework for dynamic and adaptive program customization

A Mahurkar, X Wang, H Zhang… - Proceedings of the 24th …, 2023 - dl.acm.org
Software is becoming increasingly complex and feature-rich, yet only part of any given
codebase is frequently used. Existing software customization and debloating approaches …