Title: | Hardware-assisted memory safety |
Author(s): | Liljestrand, Hans |
Date: | 2020 |
Language: | en |
Pages: | 88 + app. 83 |
Department: | Tietotekniikan laitos Department of Computer Science |
ISBN: | 978-952-60-8914-0 (electronic) 978-952-60-8913-3 (printed) |
Series: | Aalto University publication series DOCTORAL DISSERTATIONS, 8/2020 |
ISSN: | 1799-4942 (electronic) 1799-4934 (printed) 1799-4934 (ISSN-L) |
Supervising professor(s): | Asokan, N. Prof., Aalto University, Department of Computer Science, Finland |
Thesis advisor(s): | Ekberg, Jan-Erik, Adj. Prof., Aalto University, Department of Computer Science, Finland |
Subject: | Computer science |
Keywords: | platform security, memory safety |
Archive | yes |
|
|
Abstract:Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fickle in nature. Programs are written by fallible humans and run on imperfect hardware. As a result, computer systems are plagued by memory vulnerabilities. Many remedies exist; from defensive programming techniques to memory-safe languages. But these approaches require security-expertise and costly porting of existing code. To achieve wide-spread use, we must integrate security into existing tools and languages. Moreover, this must be done with minimal performance and deployment costs. New security features are being rolled out in commodity hardware. They hold the promise of security, but are non-trivial to use effectively. In this dissertation, I show how compile-time instrumentation can use such hardware for performant memory-safety solutions.
|
|
Parts:[Publication 1]: Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan. Towards Linux Kernel Memory Safety. Software: Practice and Experience, 2018. DOI: 10.1002/spe.2638 View at Publisher [Publication 2]: Shohreh Hosseinzadeh, Hans Liljestrand, Ville Leppänen, Andrew Paverd. Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization. In Proceedings of the 3rd Workshop on System Software for Trusted Execution, SysTEX ’18, Toronto, ON, Canada, pages 42–47, October 2018. DOI: 10.1145/3268935.3268940 View at Publisher [Publication 3]: Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea, Jan-Erik Ekberg, N. Asokan. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. In Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, USA, pages 177–195, August 2019. DOI: 10.5555/3361338.3361352 View at Publisher [Publication 4]: Hans Liljestrand, Zaheer Gauhar, Thomas Nuyman, Jan-Erik Ekberg, N. Asokan. Protecting the stack with PACed canaries. In Proceedings of the 4th Workshop on System Software for Trusted Execution, SysTEX ’19, Huntsville, ON, Canada, 6 pages, October 2019. DOI: 10.1145/3342559.3365336 View at Publisher [Publication 5]: Hans Liljestrand, Thomas Nyman, Lachlan Gunn, Jan-Erik Ekberg, N. Asokan. PACStack: an Authenticated Call Stack. Submitted, 20 pages, August 2019.[Errata file]: Errata of P3 |
|
|
Unless otherwise stated, all rights belong to the author. You may download, display and print this publication for Your own personal use. Commercial use is prohibited.
Page content by: Aalto University Learning Centre | Privacy policy of the service | About this site