-
Notifications
You must be signed in to change notification settings - Fork 2
/
local.bib
54 lines (48 loc) · 3.42 KB
/
local.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
@misc{arm22arm,
title = {{Arm Architecture Reference Manual Supplement - Morello for A-profile Architecture}},
author = {{Arm Limited}},
year = {2022},
note = {\url{https://developer.arm.com/documentation/ddi0606/latest}, version DDI0606 A.k},
}
@misc{morellotrm,
title = {{Arm Morello System Development Platform Technical Reference Manual}},
author = {{Arm Limited}},
year = {2022},
note = {\url{https://developer.arm.com/documentation/102278/latest}, version 0001-04},
}
@misc{morellofvp,
title = {{Morello Platform Model Reference Guide}},
author = {{Arm Limited}},
year = {2021},
note = {\url{https://developer.arm.com/documentation/102225/0200}, version 2.0},
}
@misc{fvpguide,
title = {{Fast Models Reference Guide}},
author = {{Arm Limited}},
year = {2022},
note = {\url{https://developer.arm.com/documentation/100964/1120}, version 1120},
}
@misc{joly20security,
title = {Security Analysis of {CHERI} {ISA}},
author = {Nicolas Joly and Saif ElSherei and Saar Amar},
year = {2020},
note = {\url{https://msrc.microsoft.com/blog/2020/10/security-analysis-of-cheri-isa/}},
}
@inproceedings{xia19cherivoke,
author = {Xia, Hongyan and Woodruff, Jonathan and Ainsworth, Sam and Filardo, Nathaniel W. and Roe, Michael and Richardson, Alexander and Rugg, Peter and Neumann, Peter G. and Moore, Simon W. and Watson, Robert N. M. and Jones, Timothy M.},
title = {CHERIvoke: Characterising Pointer Revocation Using CHERI Capabilities for Temporal Memory Safety},
year = {2019},
isbn = {9781450369381},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3352460.3358288},
doi = {10.1145/3352460.3358288},
abstract = {A lack of temporal safety in low-level languages has led to an epidemic of use-after-free exploits. These have surpassed in number and severity even the infamous buffer-overflow exploits violating spatial safety. Capability addressing can directly enforce spatial safety for the C language by enforcing bounds on pointers and by rendering pointers unforgeable. Nevertheless, an efficient solution for strong temporal memory safety remains elusive.CHERI is an architectural extension to provide hardware capability addressing that is seeing significant commercial and open-source interest. We show that CHERI capabilities can be used as a foundation to enable low-cost heap temporal safety by facilitating out-of-date pointer revocation, as capabilities enable precise and efficient identification and invalidation of pointers, even when using unsafe languages such as C. We develop CHERIvoke, a technique for deterministic and fast sweeping revocation to enforce temporal safety on CHERI systems. CHERIvoke quarantines freed data before periodically using a small shadow map to revoke all dangling pointers in a single sweep of memory, and provides a tunable trade-off between performance and heap growth. We evaluate the performance of such a system using high-performance x86 processors, and further analytically examine its primary overheads. When configured with a heap-size overhead of 25%, we find that CHERIvoke achieves an average execution-time overhead of under 5%, far below the overheads associated with traditional garbage collection, revocation, or page-table systems.},
booktitle = {MICRO},
pages = {545–557},
numpages = {13},
keywords = {temporal safety, security, architecture, use-after-free},
location = {Columbus, OH, USA},
series = {MICRO '52},
month = Oct
}