![]() This allows policies to be enforced on untrusted code without modifying the ![]() With traditional Reference Monitors, an IRM modifies untrusted binariesÄirectly so that they become self-monitoring. ![]() Rather than performing security checks at an operating system level as is done Language designed to be implemented by In-lined Reference Monitors (IRM's). SPoX (Security Policy XML) is a purely declarative policy specification The SPoX In-lined Reference Monitoring System In Proceedings of the New Security Paradigm Workshop (NSPW), 2016. Searching for Software Diversity: Attaining Artificial Diversity through Program Synthesis. ![]() The following sample code accompanies our publication at the 2016 New Security Paradigms Workshop (NSPW): In Proceedings of the 1st miniKanren and Relational Programming Workshop, August 2019. Relational Processing for Fun and Diversity: Simulating a CPU Relationally with miniKanren. We implemented a small CPU emulator relationally using miniKanren, and demonstrated how this can be leveraged to synthesize diverse variants of binary code (published in the 2019 miniKanren workshop): Here are slides from a lecture I gave on "Technical Writing: Tips for CS Students". In Proceedings of the 28th USENIX Security Symposium, August 2019. ![]() ConFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |