Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation 2017
DOI: 10.1145/3141235.3141244
|View full text |Cite
|
Sign up to set email alerts
|

Binary Code Retrofitting and Hardening Using SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Binary analysis is a key technique for many applications such as legacy software maintenance [Gallagher and Lyle 1991;Loyall and Mathisen 1993], reuse [Sñbjùrnsen et al 2009;Zeng et al 2013], hardening [Payer et al 2015;Wang et al 2017], debloating [Ferles et al 2017;Quach et al 2018], commercial-off-the-shelf software security testing [Li et al 2017;Rawat et al 2017], malware analysis [Song et al 2008;, and reverse engineering (e.g., communication protocol reverse engineering) [Caballero et al 2007;Lin et al 2008]. A key binary analysis is program dependence analysis that determines if there is dependence between two instructions.…”
Section: Introductionmentioning
confidence: 99%
“…Binary analysis is a key technique for many applications such as legacy software maintenance [Gallagher and Lyle 1991;Loyall and Mathisen 1993], reuse [Sñbjùrnsen et al 2009;Zeng et al 2013], hardening [Payer et al 2015;Wang et al 2017], debloating [Ferles et al 2017;Quach et al 2018], commercial-off-the-shelf software security testing [Li et al 2017;Rawat et al 2017], malware analysis [Song et al 2008;, and reverse engineering (e.g., communication protocol reverse engineering) [Caballero et al 2007;Lin et al 2008]. A key binary analysis is program dependence analysis that determines if there is dependence between two instructions.…”
Section: Introductionmentioning
confidence: 99%
“…SGX has been widely used in many applications [10,15,66,[73][74][75]. Recent works have intensively studied side-channel vulnerabilities in SGX [2,8,12,14,16,34,43,49,53,58,72,77,79], while memory attacks have also received increasing attention [11,46,65,71].…”
Section: Related Workmentioning
confidence: 99%
“…Human labor is usually mandatory in this process. Although there has been researched proposing methods to automatically partition a software project to partially fit it into SGX [17,26], none of them are mature enough for constructing and maintaining a high-quality software supply chain.…”
Section: Porting Third-party Librariesmentioning
confidence: 99%
“…Lind et al developed a method to automatically dissect software source code into different parts, of which the security-sensitive ones are placed into SGX enclaves [17]. Wang et al proposed a similar technique for binary code [26]. Liu proposed an automated way to transform realtime software into a TEE-compatible form while ensuring the software still meets the real-time demands [18].…”
Section: Related Workmentioning
confidence: 99%