- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0003100000000000
- More
- Availability
-
13
- Author / Contributor
- Filter by Author / Creator
-
-
Huo, Yuqian (4)
-
Akewar, Mayur (3)
-
Bhimani, Janki (3)
-
Patel, Tirthak (3)
-
Kverne, Christopher (2)
-
Bădoiu, Vlad-Andrei (1)
-
Chien, Yi (1)
-
Dautenhahn, Nathan (1)
-
Kaoudis, Kelly (1)
-
Lefeuvre, Hugo (1)
-
Lukas_Kverne, Christopher (1)
-
Olivier, Pierre (1)
-
Wei, Jinbiao (1)
-
Yang, Yudi (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available October 25, 2026
-
Kverne, Christopher; Akewar, Mayur; Huo, Yuqian; Patel, Tirthak; Bhimani, Janki (, ACM)Free, publicly-accessible full text available July 10, 2026
-
Lukas_Kverne, Christopher; Akewar, Mayur; Huo, Yuqian; Patel, Tirthak; Bhimani, Janki (, ACM)Free, publicly-accessible full text available July 10, 2026
-
Chien, Yi; Bădoiu, Vlad-Andrei; Yang, Yudi; Huo, Yuqian; Kaoudis, Kelly; Lefeuvre, Hugo; Olivier, Pierre; Dautenhahn, Nathan (, ACM)Compartmentalization decomposes a program into separate parts with mediated interactions through compartment interfaces—hiding information that would otherwise be accessible from a compromised component. Unfortunately, most code was not developed assuming its interfaces as trust boundaries. Left unchecked, these interfaces expose confused deputy attacks where data flowing from malicious inputs can coerce a compartment into accessing previously hidden information on-behalf-of the untrusted caller. We introduce a novel program analysis that models data flows through compartment interfaces to automatically and comprehensively find and measure the attack surface from compartment bypassing data flows. Using this analysis we examine the Linux kernel along diverse compartment boundaries and characterize the degree of vulnerability. We find that there are many compartment bypassing paths (395/4394 driver interfaces have 22741 paths), making it impossible to correct by hand. We introduce CIVSCOPE as a comprehensive and sound approach to analyze and uncover the lowerbound and potential upper-bound risks associated with the memory operations in compartment boundary interfaces.more » « less
An official website of the United States government
