2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) 2020
DOI: 10.1109/isca45697.2020.00062
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Based Domain Virtualization for Intra-Process Isolation of Persistent Memory Objects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…To allow the occurrence of WRPKR instructions in more than one trusted component, we can rely on a CFI technique for the RISC-V Rocket core [6] to protect PKR from manipulation by an attacker. libmpk [13] and Xu et al [24] provide a software-based and a hardware-based virtualization technique, respectively, to address the limited number of pkeys. We can leverage such virtualization techniques to support more than 1024 domains for SealPK.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…To allow the occurrence of WRPKR instructions in more than one trusted component, we can rely on a CFI technique for the RISC-V Rocket core [6] to protect PKR from manipulation by an attacker. libmpk [13] and Xu et al [24] provide a software-based and a hardware-based virtualization technique, respectively, to address the limited number of pkeys. We can leverage such virtualization techniques to support more than 1024 domains for SealPK.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of scalability, Intel MPK provides only 16 pkeys. However, some real-world use cases such as Persistent Memory Object (PMO) [24] and OpenSSL [13] require more than 1000 pkeys. The above-mentioned drawbacks hinder the deployment of Intel MPK for enforcing granular intra-process memory isolation.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations