Filters








7 Hits in 1.7 sec

InfoShield: A Security Architecture for Protecting Information Usage in Memory

Weidong Shi, J.B. Fryman, Guofei Gu, Hsien Hsin S. Lee, Youtao Zhang, Jun Yang
The Twelfth International Symposium on High-Performance Computer Architecture, 2006.  
Unlike prior whole memory encryption and information flow based efforts, InfoShield protects the usage of information.  ...  Though sensitive information can be encrypted when stored in non-volatile memory such as hard disks, for many e-commerce and network applications, sensitive information is often stored as plaintext in  ...  Protection on information usage Here we present a protection scheme for information usage security that uses real-time authorization codes in the application.  ... 
doi:10.1109/hpca.2006.1598131 dblp:conf/hpca/ShiFGLZY06 fatcat:mmvluqotxrakhfiw4623pfrzwm

Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems

Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno
2009 2009 International Conference on Computational Science and Engineering  
We present an architecture that places each CBS component in a hardware-enforced container.  ...  The hardware then detects improper usage of system resources (unauthorized memory accesses or denial-of-service) and enables applications to undertake a hardware-supervised recovery procedure.  ...  For some of these features, we refine and integrate some ideas in the architecture literature (for example, the memory-protection mechanism in [33] and the notion of recursive recovery in [6] ), and  ... 
doi:10.1109/cse.2009.56 dblp:conf/cse/LeontieBNSZ09 fatcat:lvnpma3k7vh3bngspseepqhpki

No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains

Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha
2012 2012 15th Euromicro Conference on Digital System Design  
We propose a hardwareenforced, fine-grained memory protection mechanism to divide the process into smaller principals and multiple protection domains.  ...  Modern programs comprise multiple threads of execution inside a single principal-the process-with a single protection domain, usually a page table.  ...  InfoShield [26] proposes a hardware reference monitor that holds the access permissions for a limited number of memory locations.  ... 
doi:10.1109/dsd.2012.89 dblp:conf/dsd/LeontieBNS12 fatcat:dn3rryadrvdjbiqrcsowxd33iq

Raksha

Michael Dalton, Hari Kannan, Christos Kozyrakis
2007 SIGARCH Computer Architecture News  
This paper proposes Raksha, an architecture for software security based on dynamic information flow tracking (DIFT).  ...  We also show that lowoverhead exception handling is critical for analyses such as memory corruption protection in order to address false positives that occur due to the diverse code patterns in frequently  ...  Infoshield [22] uses a DIFT architecture to implement information usage safety.  ... 
doi:10.1145/1273440.1250722 fatcat:gdo5x6x7xrdgje3tq44pt6ohxu

Raksha

Michael Dalton, Hari Kannan, Christos Kozyrakis
2007 Proceedings of the 34th annual international symposium on Computer architecture - ISCA '07  
This paper proposes Raksha, an architecture for software security based on dynamic information flow tracking (DIFT).  ...  We also show that lowoverhead exception handling is critical for analyses such as memory corruption protection in order to address false positives that occur due to the diverse code patterns in frequently  ...  Infoshield [22] uses a DIFT architecture to implement information usage safety.  ... 
doi:10.1145/1250662.1250722 dblp:conf/isca/DaltonKK07 fatcat:6ve3ir4yq5epxh5dkq5oqtmhma

Ribbons

Kevin J. Hoffman, Harrison Metzger, Patrick Eugster
2011 SIGPLAN notices  
Building on JikesRVM we implement ribbons by leveraging existing memory protection mechanisms in modern hardware and operating systems, avoiding the overhead of inline security checks and read or write  ...  We introduce ribbons: a shared memory programming model that allows for more implicit sharing of memory than processes but is more restrictive than threads.  ...  Related Work Many proposals for fine-and course-grained memory protection based on hardware modifications have appeared, including Mondrian [39] , Legba [38] , InfoShield [32] , and others (e.g., [  ... 
doi:10.1145/2076021.2048091 fatcat:q4johb6mirdyhld7udrtb6exwm

Ribbons

Kevin J. Hoffman, Harrison Metzger, Patrick Eugster
2011 Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications - OOPSLA '11  
Building on JikesRVM we implement ribbons by leveraging existing memory protection mechanisms in modern hardware and operating systems, avoiding the overhead of inline security checks and read or write  ...  We introduce ribbons: a shared memory programming model that allows for more implicit sharing of memory than processes but is more restrictive than threads.  ...  Related Work Many proposals for fine-and course-grained memory protection based on hardware modifications have appeared, including Mondrian [39] , Legba [38] , InfoShield [32] , and others (e.g., [  ... 
doi:10.1145/2048066.2048091 dblp:conf/oopsla/HoffmanME11 fatcat:svkzqhbynfhkznxlj4mzseqi6u