Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660378
|View full text |Cite
|
Sign up to set email alerts
|

You Can Run but You Can't Read

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 98 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…In the Intel Core microarchitecture, there are three levels of CPU caches 1 . The caches that are closer to the CPU are smaller and faster whereas the caches further away are slower 1 The mobile version of the Skylake processors has a level 4 cache too. but can store a larger amount of data.…”
Section: Cache Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…In the Intel Core microarchitecture, there are three levels of CPU caches 1 . The caches that are closer to the CPU are smaller and faster whereas the caches further away are slower 1 The mobile version of the Skylake processors has a level 4 cache too. but can store a larger amount of data.…”
Section: Cache Architecturementioning
confidence: 99%
“…Leakage-resilient code randomization schemes based on techniques like XnR and code pointer hiding [1], [7], [13] aim to provide protection by making code regions execute-only and the location of target code in memory fully unpredictable. This makes it difficult to perform code-reuse attacks given that the attacker cannot directly or indirectly disclose the code layout.…”
Section: B Leakage-resilient Code Randomizationmentioning
confidence: 99%
“…Source code instrumentation. When the source code of a program is available and the analysis is meaningful regardless of its compiled form 1 , instrumentation can take place at compilation time. Analyses can thus be encoded using source-to-source transformation languages like CIL [38] or by resorting to compiler assistance.…”
Section: Alternative Technologiesmentioning
confidence: 99%
“…Consider the case of a loop trying to read the page containing its own instructions in the cache: such an access cannot be denied on the x86 architecture. An answer to the problem may come from recent research on non-readable executable memory (XnR) [1] to prevent disclosure exploits for code reuse attacks. While the default XnR setting does not support our "in-page" reading loop scenario, follow-up techniques can be used to handle it: in particular, [62] shows how to achieve an effective separation between read and execution capabilities using Extended Page Tables on a thin hypervisor layer.…”
Section: Design Space Of Dbi Frameworkmentioning
confidence: 99%
“…The compiler generates masks for each data partition and embeds them directly in the binary code of the application [8,11], or stores them in a dedicated key cache [7]. In both cases, the masks can be protected from memory exploit-based disclosure, either by giving the binary code pages execute-only permissions [6,19,24], or by modifying the CPU such that the key cache can only be accessed through custom data access instructions [7].…”
mentioning
confidence: 99%