CISPA
Browse
Memory_Corruption_at_the_Border_of_Trusted_Execution.pdf (491.57 kB)

Memory Corruption at the Border of Trusted Execution

Download (491.57 kB)
journal contribution
posted on 2024-04-25, 07:05 authored by Tobias Cloosters, Oussama Draissi, Johannes Willbold, Thorsten HolzThorsten Holz, Lucas Davi
Trusted execution environments provide strong security guarantees, like isolation and confidentiality, but are not immune from memory-safety violations. Our investigation of public trusted execution environment code based on symbolic execution and fuzzing reveals subtle memory safety issues.

History

Primary Research Area

  • Threat Detection and Defenses

Journal

IEEE Security & Privacy

Volume

PP

Page Range

2-11

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Open Access Type

  • Hybrid

Sub Type

  • Article

BibTeX

@article{Cloosters:Draissi:Willbold:Holz:Davi:2024, title = "Memory Corruption at the Border of Trusted Execution", author = "Cloosters, Tobias" AND "Draissi, Oussama" AND "Willbold, Johannes" AND "Holz, Thorsten" AND "Davi, Lucas", year = 2024, month = 4, journal = "IEEE Security & Privacy", number = "99", pages = "2--11", publisher = "Institute of Electrical and Electronics Engineers (IEEE)", issn = "1540-7993", doi = "10.1109/msec.2024.3381439" }