2018 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2018
DOI: 10.23919/date.2018.8342161
|View full text |Cite
|
Sign up to set email alerts
|

uSFI: Ultra-lightweight software fault isolation for IoT-class devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The authors note a higher performance overhead, with the geometric mean results being 2.2% and 10.2% respectively for the two benchmarks, which leads the authors to conclude that the store hardening approach is superior in performance. However, it would be interesting to note how the performance would vary if the shadow stack was protected using an approach similar to Aweke and Austin's [9] lightweight SFI for IoT systems that shows an overhead of just 1% on the MiBench [42] benchmarks. Their approach utilizes a small amount (150 lines) of trusted code that sets up the MPU to create the fault domains, trapping accesses outside the domain as memory access faults.…”
Section: Implementation Of Basic Techniquesmentioning
confidence: 99%
“…The authors note a higher performance overhead, with the geometric mean results being 2.2% and 10.2% respectively for the two benchmarks, which leads the authors to conclude that the store hardening approach is superior in performance. However, it would be interesting to note how the performance would vary if the shadow stack was protected using an approach similar to Aweke and Austin's [9] lightweight SFI for IoT systems that shows an overhead of just 1% on the MiBench [42] benchmarks. Their approach utilizes a small amount (150 lines) of trusted code that sets up the MPU to create the fault domains, trapping accesses outside the domain as memory access faults.…”
Section: Implementation Of Basic Techniquesmentioning
confidence: 99%
“…Several dynamic attestation approaches based on creating isolated execution environments have been proposed [78][79][80][81][82], while allowing dynamic code loading [78,82]. Security architectures for process sandboxing and memory isolation [83][84][85] or privilege separation [86,87] have also been proposed for resource-constrained devices, mitigating the effect of software bugs and of the exploitation of vulnerabilities. This line of work, however, does not consider availability (or recoverability), mostly due to its potential complexity.…”
Section: Related Workmentioning
confidence: 99%