USENIX
[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Authors: Yoochan Lee and Jinhan Kwak, Seoul National University; Junesoo Kang and Yuseok Jeon, UNIST; Byoungyoung Lee, Seoul National University Journal/Conference: USENIX security '23 (open access) Source: https://www.usenix.org/conference/usenixsecurity23/presentation/lee Abstract The stealthiness of an attack is the most vital consideration for an attacker to reach their goals without being d..
[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution
Authors: Dmitry Kuznetsov and Adam Morrison, Tel Aviv University Journal/Conference: USENIX ATC 22' Source: https://www.usenix.org/conference/atc22/presentation/kuznetsov Presentation material: Abstract System calls are the main method for applications to request services from the operating system, but their invocation incurs considerable overhead, which has been aggravated by mitigation mechani..
[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection
Authors: Juwon Kim, Minsu Jang, Muhammad Danish Tehseen, Joontaek Oh, and YouJip Won, KAIST Journal/Conference: USENIX ATC '22 Source: https://www.usenix.org/conference/atc22/presentation/kim-juwon Abstract In this work, we develop the log-structured filesystem that is free from garbage collection. There are two key technical ingredients: \emph{IPLFS}, a log-structured filesystem for infinite pa..
[논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Authors: Zhi Zhang, CSIRO’s Data61, Australia; Yueqiang Cheng, NIO Security Research; Minghua Wang, Baidu Security; Wei He and Wenhao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences; Surya Nepal, CSIRO’s Data61, Australia; Yansong Gao, Nanjing University of Science and Technology, China; Kang Li, Baidu Se..