Skip to main content

Showing 1–2 of 2 results for author: Jelesnianski, C

.
  1. arXiv:2203.15121  [pdf, ps, other

    cs.CR

    Tightly Seal Your Sensitive Pointers with PACTight

    Authors: Mohannad Ismail, Andrew Quach, Christopher Jelesnianski, Yeong** Jang, Changwoo Min

    Abstract: ARM is becoming more popular in desktops and data centers, opening a new realm in terms of security attacks against ARM. ARM has released Pointer Authentication, a new hardware security feature that is intended to ensure pointer integrity with cryptographic primitives. In this paper, we utilize Pointer Authentication (PA) to build a novel scheme to completely prevent any misuse of security-sensiti… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: Accepted for publication to USENIX Security 2022

  2. arXiv:1909.09294  [pdf, ps, other

    cs.CR cs.OS

    Making Code Re-randomization Practical with MARDU

    Authors: Christopher Jelesnianski, **woo Yom, Changwoo Min, Yeong** Jang

    Abstract: Defense techniques such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) were the early role models preventing primitive code injection and return-oriented programming (ROP) attacks. Notably, these techniques did so in an elegant and utilitarian manner, kee** performance and scalability in the forefront, making them one of the few widely-adopted defense techniques… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.