usenix security '20 - pku pitfalls: attacks on pku-based memory isolation systems
Published 3 years ago • 259 plays • Length 11:10Download video MP4
Download video MP3
Similar videos
-
8:12
usenix security '22 - jenny: securing syscalls for pku-based memory isolation systems
-
11:53
usenix security '20 - donky: domain keys – efficient in-process isolation for risc-v and x86
-
23:12
usenix security '18 - imix: in-process memory isolation extension
-
12:13
usenix security '20 - an off-chip attack on hardware enclaves via the memory bus
-
12:15
usenix security '20 - copycat: controlled instruction-level attacks on enclaves
-
19:43
usenix security '19 - erim: secure, efficient in-process isolation with protection keys (mpk)
-
11:34
usenix security '20 - besfs: a posix filesystem for enclaves with a mechanized safety proof
-
11:12
usenix security '20 - retrofitting fine grain isolation in the firefox renderer
-
10:31
usenix security '20 - v0ltpwn: attacking x86 processor integrity from software
-
19:09
usenix atc '22 - epk: scalable and efficient memory protection keys
-
11:41
usenix security '20 - a formal analysis of ieee 802.11's wpa2: countering the kracks caused by...
-
12:10
usenix security '21-voltpillager: hardware-based fault injection attacks against intel sgx enclaves
-
12:09
usenix security '21 - preventing use-after-free attacks with fast forward allocation
-
32:47
usenix security '17 - hacking in darkness: return-oriented programming against secure enclaves
-
12:05
usenix security '20 - phmon: a programmable hardware monitor and its security use cases
-
19:29
usenix security '19 - the betrayal at cloud city: an empirical analysis of cloud-based mobile
-
11:35
usenix security '21 - detecting kernel refcount bugs with two-dimensional consistency checking
-
23:10
usenix security '18 - from patching delays to infection symptoms...
-
26:24
usenix security '17 - towards efficient heap overflow discovery