posted on 2024-04-25, 07:05authored byTobias Cloosters, Oussama Draissi, Johannes Willbold, Thorsten HolzThorsten Holz, Lucas Davi
Trusted execution environments provide strong security guarantees, like isolation and confidentiality, but are not immune from memory-safety violations. Our investigation of public trusted execution environment code based on symbolic execution and fuzzing reveals subtle memory safety issues.
History
Primary Research Area
Threat Detection and Defenses
Journal
IEEE Security & Privacy
Volume
PP
Page Range
2-11
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Open Access Type
Hybrid
Sub Type
Article
BibTeX
@article{Cloosters:Draissi:Willbold:Holz:Davi:2024,
title = "Memory Corruption at the Border of Trusted Execution",
author = "Cloosters, Tobias" AND "Draissi, Oussama" AND "Willbold, Johannes" AND "Holz, Thorsten" AND "Davi, Lucas",
year = 2024,
month = 4,
journal = "IEEE Security & Privacy",
number = "99",
pages = "2--11",
publisher = "Institute of Electrical and Electronics Engineers (IEEE)",
issn = "1540-7993",
doi = "10.1109/msec.2024.3381439"
}