- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0005000000000000
- More
- Availability
-
50
- Author / Contributor
- Filter by Author / Creator
-
-
Prakash, Aravind (5)
-
Cole, Matthew (3)
-
Demicco, David (3)
-
Erinfolami, Rukayat (1)
-
Ghose, Kanad (1)
-
Gollapudi, Ravi Theja (1)
-
Kothari, Gaurav (1)
-
Kulkarni, Rohit (1)
-
Ozdemir, Sarp (1)
-
Ponomarev, Dmitry (1)
-
Saptarshi, Rutvik (1)
-
Umrigar, Zerksis (1)
-
Wang, Shengdun (1)
-
Yuksek, Gokturk (1)
-
Zhang, Xin (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Demicco, David; Cole, Matthew; Wang, Shengdun; Prakash, Aravind (, 2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW))
-
Gollapudi, Ravi Theja; Yuksek, Gokturk; Demicco, David; Cole, Matthew; Kothari, Gaurav; Kulkarni, Rohit; Zhang, Xin; Ghose, Kanad; Prakash, Aravind; Umrigar, Zerksis (, IEEE Symposium on Security and Privacy)
-
Demicco, David; Erinfolami, Rukayat; Prakash, Aravind (, ACSAC '21: Annual Computer Security Applications Conference)
-
Ozdemir, Sarp; Saptarshi, Rutvik; Prakash, Aravind; Ponomarev, Dmitry (, IEEE Symposium on Secure and Private Execution Environment Design)Code Reuse Attacks (CRAs) are dangerous exploitation strategies that allow attackers to compose malicious programs out of existing application and library code gadgets, without requiring code injection. Previously, researchers explored hardware-assisted protection schemes that track attack signa- tures to identify malicious behavior. This paper makes two main contributions. First, we show that previously proposed signature-based schemes are impractical because they do not always distinguish attack patterns from the behavior of benign programs. Second, we demonstrate that instead of tracking attack signatures, a more robust defense mechanism is to track legitimate usage of system calls and ABI compliance in hard- ware, and detect deviations from established conventions as possible attacks. We propose two specific tracking mecha- nisms: the setting of arguments for system calls and register usage across function calls. We demonstrate that our solution severely hinders practical CRAs and completely stops code- reuse execution of sensitive system calls like mprotect. Our solution imposes very low performance overhead and modest design complexity.more » « less
An official website of the United States government
