Description
Modern computer systems are built out of many different layers: protocols, software, and hardware all work together to make a larger system. Developers use each layer to build the next layer above it.Security engineers can incorporate defences at different layers. Each layer has its own limitations: cryptography can’t be trusted if the software implementing it is vulnerable, and hardware can’t change to adapt to new situations. By combining primitives from different layers, we can produce security mechanisms that are more than the sum of their parts.
In this talk, we will show how cryptographic techniques, embedded into software, can protect against memory corruption attacks, and demonstrate how this can protect the return address stack and user data structures even in a vulnerable program.
Aikajakso | 11 syysk. 2023 |
---|---|
Tapahtuman otsikko | Workshop on Novel Architecture and Novel Design Automation |
Tapahtuman tyyppi | Workshop |
Sijainti | London, Iso-BritanniaNäytä kartalla |
Tunnustuksen arvo | International |
Asiakirjat ja linkit
Tähän liittyvä sisältö
-
Julkaisut ja taiteelliset tuotokset
-
Towards cryptographically-authenticated in-memory data structures
Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussa › Conference article in proceedings › Scientific › vertaisarvioitu
-
PACStack: an Authenticated Call Stack
Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussa › Conference article in proceedings › Scientific › vertaisarvioitu
-
Projektit
-
Rigorous security guarantees for run-time integrity
Projekti: RCF Postdoctoral Researcher