NanoTag: Systems Support for Efficient Byte-Granular Overflow Detection on ARM MTE
Pith reviewed 2026-05-18 13:26 UTC · model grok-4.3
The pith
NanoTag enables byte-granular buffer overflow detection on ARM MTE hardware using software tripwires.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
NanoTag detects buffer overflows at byte granularity by setting up a tripwire for tag granules that may require intra-granule overflow detection. The memory access to the tripwire causes additional overflow detection in the software while using MTE's hardware to detect bugs for the rest of the accesses. Implemented on the Scudo allocator, evaluations show it detects nearly as many memory safety bugs as ASAN while incurring similar run-time overhead to Scudo in MTE SYNC mode.
What carries the argument
The tripwire mechanism for tag granules, which selectively invokes software overflow detection on top of MTE hardware checks.
If this is right
- NanoTag can detect more precise buffer overflows than standard MTE implementations.
- It maintains runtime performance similar to MTE SYNC mode on Android devices.
- Only minimal changes to existing memory allocators are needed for integration.
- It applies to unmodified MTE-enabled binaries, simplifying deployment for testing.
Where Pith is reading between the lines
- This approach might be adaptable to other memory tagging hardware beyond ARM.
- Future hardware revisions could incorporate finer granularity if software tripwires prove effective.
- The probabilistic aspect could be tuned for different testing scenarios to balance detection rate and overhead.
Load-bearing premise
The tripwire can be inserted with minimal allocator changes while keeping the detection-performance tradeoff acceptable for in-house testing.
What would settle it
A test where NanoTag misses many more bugs than ASAN or shows significantly higher overhead than MTE SYNC on the evaluated benchmarks and case studies.
Figures
read the original abstract
Memory safety bugs, such as buffer overflows and use-after-frees, are the leading causes of software safety issues in production. Software-based approaches, e.g., Address Sanitizer (ASAN), can detect such bugs with high precision, but with prohibitively high overhead. ARM's Memory Tagging Extension (MTE) offers a promising alternative to detect these bugs in hardware with a much lower overhead. In this paper, we perform a thorough investigation of the first production implementation of ARM MTE (Google Pixel 8) and observe that MTE can only achieve coarse precision in bug detection compared with software-based approaches such as ASAN, mainly due to its 16-byte tag granularity. To address this issue, we present NANOTAG, a system to probabilistically detect buffer overflows at byte granularity in unmodified MTE-enabled binaries with minimal changes to memory allocators, introducing an explicit detection-performance tradeoff for in-house testing. NANOTAG detects buffer overflows at byte granularity by setting up a tripwire for tag granules that may require intra-granule overflow detection. The memory access to the tripwire causes additional overflow detection in the software while using MTE's hardware to detect bugs for the rest of the accesses. We implement NANOTAG based on the Scudo Hardened Allocator, the default memory allocator on Android since Android 11. Our evaluation results across popular benchmarks and real-world case studies show that NANOTAG detects nearly as many memory safety bugs as ASAN while incurring similar run-time overhead to Scudo Hardened Allocator in MTE SYNC mode.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper presents NanoTag, a system built on the Scudo allocator that augments ARM MTE to achieve byte-granular buffer overflow detection. It does so by placing tripwire tags on selected granules; accesses hitting a tripwire divert to a software check while all other accesses use MTE hardware. The central claim is that this yields detection rates nearly matching ASAN while incurring runtime overhead comparable to Scudo in MTE SYNC mode, with only minimal allocator modifications and an explicit detection-performance tradeoff for in-house testing.
Significance. If the performance and detection claims hold under broader workloads, NanoTag would offer a practical middle ground between coarse-grained hardware tagging and high-overhead software sanitizers, enabling finer-grained memory safety checks in production binaries with modest changes to existing allocators.
major comments (2)
- [Evaluation] Evaluation section: the abstract states that NanoTag detects nearly as many bugs as ASAN with Scudo-like overhead, yet reports no error bars, exact bug counts, or details on post-hoc exclusions and workload selection. Without these, the quantitative support for the 'near-ASAN' and 'similar overhead' claims cannot be assessed.
- [Design / Overhead Analysis] Tripwire design and § on overhead analysis: the claim that software diversions remain rare enough to preserve Scudo-MTE overhead levels rests on the assumption that boundary accesses are infrequent. Workloads with many small allocations or frequent end-of-object accesses could make tripwire hits common, causing the software path to dominate; the current benchmark suite may under-sample these cases.
minor comments (1)
- [Abstract] Abstract: the phrase 'probabilistically detect' is used without specifying the underlying probability model or how it interacts with MTE's tag collision probability.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback. We address each major comment below and indicate the revisions planned for the next version of the manuscript.
read point-by-point responses
-
Referee: [Evaluation] Evaluation section: the abstract states that NanoTag detects nearly as many bugs as ASAN with Scudo-like overhead, yet reports no error bars, exact bug counts, or details on post-hoc exclusions and workload selection. Without these, the quantitative support for the 'near-ASAN' and 'similar overhead' claims cannot be assessed.
Authors: We agree that additional details are needed to allow readers to fully evaluate the claims. In the revised manuscript we will add error bars to the relevant figures based on repeated runs of the benchmarks. We will also include a table reporting the exact bug counts detected by NanoTag versus ASAN for each workload and case study, together with a description of how the workloads were chosen and any post-hoc exclusions that were applied. revision: yes
-
Referee: [Design / Overhead Analysis] Tripwire design and § on overhead analysis: the claim that software diversions remain rare enough to preserve Scudo-MTE overhead levels rests on the assumption that boundary accesses are infrequent. Workloads with many small allocations or frequent end-of-object accesses could make tripwire hits common, causing the software path to dominate; the current benchmark suite may under-sample these cases.
Authors: We acknowledge that the overhead claims depend on boundary accesses remaining infrequent. The overhead analysis section already shows that the software path is taken only rarely under the evaluated workloads, keeping overall cost close to Scudo-MTE. To address the concern about possible under-sampling, we will add a new paragraph discussing the allocation-size distribution in our benchmark suite and include results from microbenchmarks that deliberately stress small allocations and end-of-object accesses. This will make the conditions under which the tripwire mechanism preserves low overhead more explicit. revision: partial
Circularity Check
No circularity: claims rest on implementation and benchmark measurements
full rationale
The paper describes an implemented system (NanoTag on Scudo allocator) that uses MTE hardware for most accesses and software tripwire checks for intra-granule cases. Central claims about detection precision and overhead are supported by reported runtime measurements on benchmarks and case studies, not by equations, fitted parameters, or self-referential definitions. No load-bearing step reduces to its own inputs by construction; the design is self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption ARM MTE hardware tags memory at 16-byte granularity and can only detect overflows that cross granule boundaries
invented entities (1)
-
Tripwire for selected tag granules
no independent evidence
Reference graph
Works this paper leans on
-
[1]
[n. d.]. 3.2.2 The GNU Allocator.https://www.gnu.org/software/libc/ manual/html_node/The-GNU-Allocator.html. [Online; accessed 1- April-2025]
work page 2025
-
[2]
[n. d.]. aarch64: MTE compatible strcpy.https://github.com/bminor/ glibc/commit/bb2c12aecbd26a8d29f63b51b80b7c84e65d1818. [Online; accessed 1-April-2025]
work page 2025
-
[3]
[n. d.].About the Debug Register Interface.https://developer.arm.com/ documentation/ddi0379/a/Debug-Register-Interfaces/About-the- Debug-Register-Interface?lang=en
-
[4]
[n. d.]. AddressSanitizer | Anroid Open Source Project.https://source. android.com/docs/security/test/asan. [Online; accessed 1-April-2025]
work page 2025
-
[5]
d.].AmpereOne Product Brief.https://amperecomputing.com/ briefs/ampereone-family-product-brief
[n. d.].AmpereOne Product Brief.https://amperecomputing.com/ briefs/ampereone-family-product-brief
-
[6]
[n. d.]. ARM A-profile A64 Instruction Set Architecture | Loads and Stores.https://developer.arm.com/documentation/ddi0602/2024-09/ Index-by-Encoding/Loads-and-Stores?lang=en. [Online; accessed 1-April-2025]
work page 2024
-
[7]
[n. d.]. Armv8.5-A Memory Tagging Extension White Paper.https:// developer.arm.com/documentation/102925/latest/. [Online; accessed 1-April-2025]
work page 2025
-
[8]
d.].A voiding runcpu - CPU 2017.https://www.spec.org/cpu2017/ Docs/runcpu-avoidance.html
[n. d.].A voiding runcpu - CPU 2017.https://www.spec.org/cpu2017/ Docs/runcpu-avoidance.html
work page 2017
-
[9]
[n. d.]. chroot(2) - Linux manual page.https://man7.org/linux/man- pages/man2/chroot.2.html. [Online; accessed 1-April-2025]
work page 2025
-
[10]
d.].Clang 14.0.0 documentation.https://releases.llvm.org/14.0.0/ tools/clang/docs/index.html
[n. d.].Clang 14.0.0 documentation.https://releases.llvm.org/14.0.0/ tools/clang/docs/index.html
-
[11]
[n. d.]. CVE-2024-12084 - Red Hat Customer Portal.https://access. redhat.com/security/cve/CVE-2024-12084. [Online; accessed 1-April- 2025]
work page 2024
-
[12]
[n. d.]. CWE - 2024 CWE Top 25 Most Dangerous Software Weaknesses. https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html. [On- line; accessed 1-April-2025]
work page 2024
-
[13]
[n. d.]. Enhanced security through Memory Tagging Extension. https://community.arm.com/arm-community-blogs/b/architectures- and-processors-blog/posts/enhanced-security-through-mte. [Online; accessed 1-April-2025]
work page 2025
-
[14]
d.].EnvironmentVariables - Community Help Wiki.https://help
[n. d.].EnvironmentVariables - Community Help Wiki.https://help. ubuntu.com/community/EnvironmentVariables
-
[15]
[n. d.].facebook/infer: A static analyzer for Java, C, C++, and Objective- C.https://github.com/facebook/infer
-
[16]
[n. d.]. Geekbench 6 - Apps on Google Play.https://play.google.com/ store/apps/details?id=com.primatelabs.geekbench6&hl=en_US. [On- line; accessed 1-April-2025]
work page 2025
-
[17]
[n. d.]. Geekbench 6 - Cross-Platform Benchmark.https://www. geekbench.com/. [Online; accessed 1-April-2025]
work page 2025
-
[18]
[n. d.]. Geekbench 6 on the App Store.https://apps.apple.com/us/app/ geekbench-6/id1565728895. [Online; accessed 1-April-2025]
work page 2025
-
[19]
[n. d.]. Getting started - Termux Wiki.https://wiki.termux.com/wiki/ Getting_started. [Online; accessed 1-April-2025]
work page 2025
-
[20]
[n. d.]. glibc/sysdeps/aarch64/strcpy.S.https://github.com/bminor/ glibc/blob/ce2f26a22e6b6f5c108d156afd9b43a452bb024c/sysdeps/ aarch64/strcpy.S. [Online; accessed 1-April-2025]
work page 2025
-
[21]
[n. d.]. The GNU C Library - GNU Project - Free Software Foundation. https://www.gnu.org/software/libc/. [Online; accessed 1-April-2025]
work page 2025
-
[22]
[n. d.]. Hardware-assisted AddressSanitizer | Android Open Source Project.https://source.android.com/docs/security/test/hwasan. [On- line; accessed 1-April-2025]
work page 2025
-
[23]
[n. d.]. Juliet C/C++ 1.3 - NIST Software Assurance Reference Dataset. https://samate.nist.gov/SARD/test-suites/112. [Online; accessed 1- April-2025]
work page 2025
-
[24]
[n. d.]. LeakSanitizer - Clang 21.0.0git documentation.https://clang. llvm.org/docs/LeakSanitizer.html. [Online; accessed 1-April-2025]
work page 2025
-
[25]
[n. d.].llvm_mode persistent mode.https://github.com/AFLplusplus/ AFLplusplus/blob/stable/instrumentation/README.persistent_ mode.md
-
[26]
[n. d.]. Memory corruption bug uncovered by MTE fixed by Google after GrapheneOS report.https://discuss.grapheneos.org/d/12628- memory-corruption-bug-uncovered-by-mte-fixed-by-google-after- grapheneos-report. [Online; accessed 1-April-2025]
work page 2025
-
[27]
[n. d.]. Memory safety | Android Open Source Project.https://source. android.com/docs/security/test/memory-safety. [Online; accessed 1-April-2025]
work page 2025
-
[28]
[n. d.]. Memory Tagging Extension (MTE) in AArch64 Linux.http://docs.kernel.org/arch/arm64/memory-tagging- extension.html#memory-tagging-extension-mte-in-aarch64-linux. [Online; accessed 1-April-2025]
work page 2025
-
[29]
[n. d.]. MemTagSanitizer - LLVM 21.0.0git documentation.https: //llvm.org/docs/MemTagSanitizer.html. [Online; accessed 1-April- 2025]
work page 2025
-
[30]
[n. d.]. MTE bootloader support.https://source.android.com/docs/ security/test/memory-safety/bootloader-support. [Online; accessed 1-April-2025]
work page 2025
-
[31]
[n. d.]. MTE modes.https://developer.arm.com/documentation/ 108035/0100/How-does-MTE-work-/MTE-modes. [Online; accessed 1-April-2025]
work page 2025
-
[32]
[n. d.]. NVD - CVE-2024-12084.https://nvd.nist.gov/vuln/detail/CVE- 2024-12084. [Online; accessed 1-April-2025]
work page 2024
-
[33]
[n. d.].Overview: Breakpoints and Watchpoints.https: //developer.arm.com/documentation/dui0446/z/controlling-target- execution/overview--breakpoints-and-watchpoints
-
[34]
[n. d.]. Preview Versions - Geekbench.https://www.geekbench.com/ preview/. [Online; accessed 1-April-2025]
work page 2025
-
[35]
[n. d.]. Project Zero: First Handset with MTE on the mar- ket.https://googleprojectzero.blogspot.com/2023/11/first-handset- with-mte-on-market.html. [Online; accessed 1-April-2025]
work page 2023
-
[36]
d.].Release v1.2.1, HexHive/magma.https://github.com/HexHive/ magma/tree/v1.2.1
[n. d.].Release v1.2.1, HexHive/magma.https://github.com/HexHive/ magma/tree/v1.2.1
-
[37]
[n. d.]. rsync.https://rsync.samba.org/. [Online; accessed 1-April- 2025]
work page 2025
-
[38]
[n. d.].RSync: Heap Buffer Overflow, Info Leak, Server Leaks, Path Traversal and Safe links Bypass.https://github.com/google/security- research/security/advisories/GHSA-p5pg-x43v-mvqj
-
[39]
[n. d.]. rsync/lib/md-defines.h.https://github.com/RsyncProject/ rsync/blob/9615a2492bbf96bc145e738ebff55bbb91e0bbee/lib/md- defines.h#L11-L21. [Online; accessed 1-April-2025]
work page 2025
-
[40]
[n. d.]. rsync/rsync.c.https://github.com/RsyncProject/rsync/blob/ 9615a2492bbf96bc145e738ebff55bbb91e0bbee/rsync.h#L955-L962. 12 [Online; accessed 1-April-2025]
work page 2025
-
[41]
[n. d.]. rsync/sender.c.https://github.com/RsyncProject/rsync/blob/ 9615a2492bbf96bc145e738ebff55bbb91e0bbee/sender.c#L96-L100. [Online; accessed 1-April-2025]
work page 2025
-
[42]
[n. d.]. Scudo | Android Open Source Project.https://source.android. com/docs/security/test/scudo. [Online; accessed 1-April-2025]
work page 2025
-
[43]
[n. d.]. Scudo Hardened Allocator - LLVM 21.0.0git documentation. https://llvm.org/docs/ScudoHardenedAllocator.html. [Online; ac- cessed 1-April-2025]
work page 2025
-
[44]
[n. d.]. Signal Handling (The GNU C Library).https://www.gnu.org/ software/libc/manual/html_node/Signal-Handling.html. [Online; accessed 1-April-2025]
work page 2025
-
[45]
d.].SPEC CPU®2017 benchmark.https://www.spec.org/cpu2017/
[n. d.].SPEC CPU®2017 benchmark.https://www.spec.org/cpu2017/
work page 2017
-
[46]
[n. d.].System V contexts (The GNU C Library).https://www.gnu.org/ software/libc/manual/html_node/System-V-contexts.html
-
[47]
[n. d.]. Tagged pointers | Android Open Source Project.https://source. android.com/docs/security/test/tagged-pointers. [Online; accessed 1-April-2025]
work page 2025
-
[48]
[n. d.]. Termux | The main termux site and help pages.https://termux. dev/en/. [Online; accessed 1-April-2025]
work page 2025
-
[49]
d.].ThunderX2 - Cavium - WikiChip.https://en.wikichip.org/wiki/ cavium/thunderx2
[n. d.].ThunderX2 - Cavium - WikiChip.https://en.wikichip.org/wiki/ cavium/thunderx2
-
[50]
[n. d.]. Where is the MTE Tag stored and Checked?https://developer. arm.com/documentation/ka005620/1-0/?lang=en. [Online; accessed 1-April-2025]
work page 2025
-
[51]
Yechan Bae, Youngsuk Kim, Ammar Askar, Jungwon Lim, and Taesoo Kim. 2021. Rudra: Finding Memory Safety Bugs in Rust at the Ecosys- tem Scale. InSOSP ’21: ACM SIGOPS 28th Symposium on Operating Systems Principles, Virtual Event / Koblenz, Germany, October 26-29, 2021, Robbert van Renesse and Nickolai Zeldovich (Eds.). ACM, 84–99. https://doi.org/10.1145/34...
-
[52]
Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, and Chao Zhang. 2023. MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. In32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, Joseph A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 841–858.ht...
work page 2023
-
[53]
Yu-Chang Chen and Shih-Wei Li. 2024. HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tag- ging Extension. InProceedings of the 19th International Conference on A vailability, Reliability and Security, ARES 2024, Vienna, Austria, 30 July 2024 - 2 August 2024. ACM, 30:1–30:11.https://doi.org/10.1145/ 3664476.3664492
-
[54]
Peter Collingbourne. [n. d.]. scudo: Use DC GZVA instruc- tion in storeTags().https://github.com/llvm/llvm-project/commit/ 46c59d91dc7a39cc98be7a68d6dc60f3e8a35df0. [Online; accessed 1- April-2025]
work page 2025
-
[55]
Joe Devietti, Colin Blundell, Milo M. K. Martin, and Steve Zdancewic
-
[56]
(2008), 103–114.https://doi.org/10.1145/ 1346281.1346295
Hardbound: architectural support for spatial safety of the C programming language. (2008), 103–114.https://doi.org/10.1145/ 1346281.1346295
-
[57]
Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer
-
[58]
KARONTE: Detecting insecure multi-binary interactions in embedded firmware
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020. IEEE, 1497–1511. https://doi.org/10.1109/SP40000.2020.00009
-
[59]
Gregory J. Duck and Roland H. C. Yap. 2016. Heap bounds protection with low fat pointers. InProceedings of the 25th International Conference on Compiler Construction, CC 2016, Barcelona, Spain, March 12-18, 2016, Ayal Zaks and Manuel V. Hermenegildo (Eds.). ACM, 132–142. https://doi.org/10.1145/2892208.2892212
-
[60]
Gregory J. Duck and Roland H. C. Yap. 2018. EffectiveSan: type and memory error detection using dynamically typed C/C++. InProceed- ings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2018, Philadelphia, PA, USA, June 18-22, 2018, Jeffrey S. Foster and Dan Grossman (Eds.). ACM, 181–195. https://doi.org/10.1145/3...
-
[61]
Gregory J. Duck, Roland H. C. Yap, and Lorenzo Cavallaro. 2017. Stack Bounds Protection with Low Fat Pointers. In24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Inter- net Society.https://www.ndss-symposium.org/ndss2017/ndss-2017- programme/stack-object-protection-low-f...
work page 2017
-
[62]
Reza Mirzazade Farkhani, Mansour Ahmadi, and Long Lu. 2021. PTAuth: Temporal Memory Safety via Robust Points-to Authenti- cation. In30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael D. Bailey and Rachel Greenstadt (Eds.). USENIX Association, 1037–1054.https://www.usenix.org/conference/ usenixsecurity21/presentation/mirzazade
work page 2021
-
[63]
Andrea Fioraldi, Daniele Cono D’Elia, and Leonardo Querzoni. 2020. Fuzzing Binaries for Memory Safety Errors with QASan. InIEEE Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020. IEEE, 23–30.https://doi.org/10.1109/SECDEV45635.2020.00019
-
[64]
Andrea Fioraldi, Dominik Christian Maier, Heiko Eißfeldt, and Marc Heuse. 2020. AFL++ : Combining Incremental Steps of Fuzzing Research. In14th USENIX Workshop on Offensive Technologies, WOOT 2020, August 11, 2020, Yuval Yarom and Sarah Zennou (Eds.). USENIX Association.https://www.usenix.org/conference/woot20/ presentation/fioraldi
work page 2020
-
[65]
Floris Gorter, Taddeus Kroes, Herbert Bos, and Cristiano Giuffrida
-
[66]
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. InIEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024. IEEE, 4239–4257.https://doi.org/10.1109/SP54263.2024.00263
-
[67]
Andreas Hager-Clukas and Konrad Hohentanner. 2024. DMTI: Ac- celerating Memory Error Detection in Precompiled C/C++ Binaries with ARM Memory Tagging Extension. InProceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024, Jianying Zhou, Tony Q. S. Quek, Debin Gao, and Alvaro A. Cárdenas (E...
-
[68]
Reed Hastings and Bob Joyce. [n. d.]. Purify: A tool for detecting memory leaks and access errors in C and C++ programs. InProceedings of the Winter 1992 USENIX Conference. 125–138
work page 1992
-
[69]
Ahmad Hazimeh, Adrian Herrera, and Mathias Payer. 2020. Magma: A Ground-Truth Fuzzing Benchmark.Proc. ACM Meas. Anal. Comput. Syst.4, 3 (2020), 49:1–49:29.https://doi.org/10.1145/3428334
-
[70]
Juhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, and Byoungyoung Lee. 2024. PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux. InProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024, Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda...
-
[71]
Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, and Byoungyoung Lee. 2025. Tiktag: Breaking ARM’s Memory Tagging Extension with Speculative Execution. In IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025, Marina Blanton, William Enck, and Cristina Nita-Rotaru (Eds.). IEEE, 4063–4081.htt...
-
[72]
Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, and Zhiyun Qian. 2023. A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel. In32nd USENIX 13 Security Symposium, USENIX Security 2023, Anaheim, CA, USA, Au- gust 9-11, 2023, Joseph A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 4211–4228.h...
work page 2023
-
[73]
Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, and Chao Zhang. 2022. PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication. InProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, Heng Yin, Angelos Stavrou, Cas Creme...
-
[74]
Hans Liljestrand, Carlos Chinea Perez, Rémi Denis-Courmont, Jan- Erik Ekberg, and N. Asokan. 2022. Color My World: Deterministic Tagging for Memory Safety.CoRRabs/2204.03781 (2022).https: //doi.org/10.48550/ARXIV.2204.03781arXiv:2204.03781
work page doi:10.48550/arxiv.2204.03781arxiv:2204.03781 2022
-
[75]
Soo-Yee Lim, Tanya Prasad, Xueyuan Han, and Thomas Pasquier
-
[76]
SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions. InProceedings of the 2024 on Cloud Computing Security Workshop, CCSW 2024, Salt Lake City, UT, USA, October 14-18, 2024, Apostolos P. Fournaris and Paolo Palmieri (Eds.). ACM, 80–94.https: //doi.org/10.1145/3689938.3694781
-
[77]
Hao Ling, Heqing Huang, Chengpeng Wang, Yuandao Cai, and Charles Zhang. 2024. GIANTSAN: Efficient Memory Sanitization with Seg- ment Folding. InProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, ASPLOS 2024, La Jolla, CA, USA, 27 April 2024- 1 May 2024, Rajiv Gupta, Nael...
-
[78]
Shrobe, Mathias Payer, Hamed Okhravi, and Nathan Burow
Derrick Paul McKee, Yianni Giannaris, Carolina Ortega, Howard E. Shrobe, Mathias Payer, Hamed Okhravi, and Nathan Burow. 2022. Preventing Kernel Hacks with HAKCs. In29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, Califor- nia, USA, April 24-28, 2022. The Internet Society.https://www.ndss- symposium.org/ndss-paper/auto-...
work page 2022
-
[79]
Matt Miller. 2019.Trends, Challenge, and Shifts in Software Vulner- ability Mitigation.https://github.com/Microsoft/MSRC-Security- Research/blob/master/presentations/2019_02_BlueHatIL/2019_01% 20-%20BlueHatIL%20-%20Trends%2C%20challenge%2C%20and% 20shifts%20in%20software%20vulnerability%20mitigation.pdf
work page 2019
-
[80]
DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks
Marius Momeu, Alexander J. Gaidis, Jasper v. d. Heidt, and Vasileios P. Kemerlis. 2025. IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions. InIEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025, Marina Blanton, William Enck, and Cristina Nita-Rotaru (Eds.). IEEE, 867–885.htt...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.