You should have a look on our take on this (IMIX on USENIX Security 2018), I think it is quite similar :) https://www.usenix.org/conference/usenixsecurity18/presentation/frassetto …
-
-
-
Thanks, I forwarded that paper ref on to the authors :)
End of conversation
New conversation -
-
-
This policy enforces a neat property I'd call set integrity. Attackers can locate and still compromise pointer stores (or indexes into pointer arrays). Attacks will be harder but not impossible, becoming more program dependant. (Disclaimer: I only skimmed b/c mobile)
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
It's interesting. It has promise, but I think this bit is very concerning and needs further consideration to get rid of the interrupt loophole. Context switches are far too easily timed.pic.twitter.com/MqrmF3WsGO
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
You probably know this already but in case not:
@yuvalyarom et al#eurosys#apsys time protection ("missing OS abstraction") & aISA as abstraction shielderhttps://twitter.com/daniel_bilar/status/1118295909773840386 …
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
It looks very innovative!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.