- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0005000000000000
- More
- Availability
-
50
- Author / Contributor
- Filter by Author / Creator
-
-
Venkat, Ashish (5)
-
Moody, Logan (2)
-
Ren, Xida (2)
-
Sharifi, Rasool (2)
-
Skadron, Kevin (2)
-
Taram, Mohammadkazem (2)
-
Berry, Layne (1)
-
Gaur, Jayesh (1)
-
Jordan, Matthew (1)
-
Lenjani, Marzieh (1)
-
Parkhurst, Jeff (1)
-
Qi, Wei (1)
-
Rudek, Joey (1)
-
Sharifi, Abdolrasoul (1)
-
Subramoney, Sreenivas (1)
-
Tullsen, Dean (1)
-
Tullsen, Dean M. (1)
-
Wu, Lingxi (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
- Filter by Editor
-
-
null (3)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Taram, Mohammadkazem; Ren, Xida; Venkat, Ashish; Tullsen, Dean (, Proceedings of the 31st USENIX Security Symposium)
-
Wu, Lingxi; Sharifi, Rasool; Lenjani, Marzieh; Skadron, Kevin; Venkat, Ashish (, 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA))null (Ed.)
-
Ren, Xida; Moody, Logan; Taram, Mohammadkazem; Jordan, Matthew; Tullsen, Dean M.; Venkat, Ashish (, 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA))null (Ed.)
-
Sharifi, Rasool; Venkat, Ashish (, 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA))null (Ed.)This work introduces the CHEx86 processor architecture for securing applications, including legacy binaries, against a wide array of security exploits that target temporal and spatial memory safety vulnerabilities such as out-of-bounds accesses, use-after-free, double-free, and uninitialized reads, by instrumenting the code at the microcode-level, completely under-the-hood, with only limited access to source-level symbol information. In addition, this work presents a novel scheme for speculatively tracking pointer arithmetic and pointer movement, including the detection of pointer aliases in memory, at the machine code-level using a configurable set of automatically constructed rules. This architecture outperforms the address sanitizer, a state-of-the-art software-based mitigation by 59%, while eliminating porting, deployment, and verification costs that are invariably associated with recompilation.more » « less
An official website of the United States government

Full Text Available