Fault attacks enable adversaries to manipulate the control-flow of
secur...
Modern processors include high-performance cryptographic functionalities...
We present Blinded Memory (BliMe), a way to realize efficient and secure...
Hardware-assisted memory protection features are increasingly being depl...
Software control flow integrity (CFI) solutions have been applied to the...
Stack canaries remain a widely deployed defense against memory corruptio...
A popular run-time attack technique is to compromise the control-flow
in...
Data-oriented attacks manipulate non-control data to alter a program's b...
Run-time attacks against programs written in memory-unsafe programming
l...
Intel Software Guard Extensions (SGX) is a promising hardware-based
tech...
The security of billions of devices worldwide depends on the security an...