Always private
DuckDuckGo never tracks your searches.
Learn More
You can hide this reminder in Search Settings
All regions
Argentina
Australia
Austria
Belgium (fr)
Belgium (nl)
Brazil
Bulgaria
Canada (en)
Canada (fr)
Catalonia
Chile
China
Colombia
Croatia
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hong Kong
Hungary
Iceland
India (en)
Indonesia (en)
Ireland
Israel (en)
Italy
Japan
Korea
Latvia
Lithuania
Malaysia (en)
Mexico
Netherlands
New Zealand
Norway
Pakistan (en)
Peru
Philippines (en)
Poland
Portugal
Romania
Russia
Saudi Arabia
Singapore
Slovakia
Slovenia
South Africa
Spain (ca)
Spain (es)
Sweden
Switzerland (de)
Switzerland (fr)
Taiwan
Thailand (en)
Turkey
Ukraine
United Kingdom
US (English)
US (Spanish)
Vietnam (en)
Safe search: moderate
Strict
Moderate
Off
Any time
Any time
Past day
Past week
Past month
Past year
  1. patents.google.com

    Techniques for securely rolling back execution of software executing in multiple software fault isolation domains are disclosed. An example method, for software that comprises two or more software modules compartmentalized into two or more distinct software fault isolation domains, comprises the step of detecting (510) that execution flow of the software has transferred or is transferring from ...
  2. patentscope.wipo.int

    Techniques for securely rolling back execution of software executing in multiple software fault isolation domains are disclosed. An example method, for software that comprises two or more software modules compartmentalized into two or more distinct software fault isolation domains, comprises the step of detecting (510) that execution flow of the software has transferred or is transferring from ...
  3. 2.1 Software Fault Isolation Software fault isolation (SFI) [103] is a technique for establishing logical protection domains within a process through program trans-formations. SFI instruments the program to intermediate memory accesses to ensure they do not violate domain boundaries. Since transitioning from one domain to another stays within ...
  4. gulmezmerve.github.io

    memory, not the memory of other domains • We leverage hardware-assisted software fault isolation (SFI) based on Protection Keys for Userspace in COTS processors (Intel, AMD) Implementation: Library for Secure Domain RollBack(SDRoB) We present secure in-process rollback, an approach for recovering vulnerable applications after an attack is ...
  5. semanticscholar.org

    This work proposes secure rollback of isolated domains as an efficient and secure method of improving the resilience of software targeted by run-time attacks and shows the practicability of the methodology by realizing a software library for Secure Domain Rollback (SDRoB) and how it can be applied to real-world software. The use of unsafe programming languages still remains one of the major ...
  6. The use of unsafe programming languages still remains one of the major root causes of software vulnerabilities. Although well-known defenses that detect and mitigate memory-safety related issues exist, they don't address the challenge of software resilience, i.e., whether a system under attack can continue to carry out its function when subjected to malicious input. We propose secure rollback ...
  7. secure-rewind-and-discard.github.io

    B. Software Fault Isolation Software fault isolation (SFI) [39] is a technique for establishing logical protection domains within a process through program transformations. SFI instruments the program to intermediate memory accesses, ensuring that they do not violate domain boundaries. Since transitioning from one domain to
  8. semanticscholar.org

    This work proposes secure rollback of isolated domains as an efficient and secure method of improving the resilience of software targeted by run-time attacks and shows the practicability of the methodology by realizing a software library for Secure Domain Rollback (SDRoB) and how it can be applied to real-world software.
  9. In earlier research we introduce Secure Rewind and Discard of Isolated Domains [6], as briefly described in §II. Our ap-proach leverages mechanisms for hardware-assisted in-process isolation in commercial, off-the-shelf processors and allows retrofitting C applications with the capability to recover from memory errors in isolated components.
  10. ieeexplore.ieee.org

    Well-known defenses exist to detect and mitigate common faults and memory safety vulnerabilities in software. Yet, many of these mitigations do not address the challenge of software resilience and availability, i.e., whether a system can continue to carry out its function and remain responsive, while being under attack and subjected to malicious inputs. In this paper we propose secure rewind ...

    Can’t find what you’re looking for?

    Help us improve DuckDuckGo searches with your feedback

Custom date rangeX