Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813690
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(54 citation statements)
references
References 35 publications
0
54
0
Order By: Relevance
“…Such sets have been encrypted as private sets to protect the privacy of label information from the party B. Certain secure domain isolation has been used to protect the splits [34].…”
Section: B Key Algorithmsmentioning
confidence: 99%
“…Such sets have been encrypted as private sets to protect the privacy of label information from the party B. Certain secure domain isolation has been used to protect the splits [34].…”
Section: B Key Algorithmsmentioning
confidence: 99%
“…Liu et al propose a mechanism for automatically partitioning applications for security, using static and dynamic analyses. However, they do not specifically consider the different ways in which applications may be partitioned, as we have carried out in this paper [26].…”
Section: Related Workmentioning
confidence: 99%
“…Although others have presented details of TEEs [13,14,[23][24][25], tools for automatically partitioning applications [26] and tools for evaluating compartmentalisation schemes [27], to the best of our knowledge, we are the first to present a systematisation of partitioning schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Today, the landscape of isolation solutions is starting to change with the emergence of new hardware isolation primitives. VM function extended page-table (EPT) switching and memory protection keys (MPKs) provide support for memory isolation and cross-domain invocations with overheads comparable to system calls [45,51,62,68]. Unfortunately, neither MPKs nor EPT switching implement architectural support for isolation of privileged ring 0 kernel code, the code that runs with superuser privileges and can easily escape such isolation by accessing a wide range of privileged CPU instructions.…”
Section: Introductionmentioning
confidence: 99%