{"663472":{"#nid":"663472","#data":{"type":"event","title":"PhD Proposal by Yonghae Kim ","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003ETitle:\u003C\/strong\u003E\u0026nbsp;Hardware-based Always-On Memory Safety\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EDate:\u003C\/strong\u003E\u0026nbsp;Tuesday, November 29th\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETime:\u0026nbsp;9:30\u003C\/strong\u003Eam\u0026nbsp;- 11:00am EST\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ELocation:\u0026nbsp;\u003C\/strong\u003E1202 Conference Room Klaus,\u0026nbsp;Virtual:\u0026nbsp;\u003Ca href=\u0022https:\/\/gatech.zoom.us\/j\/96289990465?pwd=TE9jOGp1anFDNDZxMU5KSktPTWZBQT09\u0022\u003EZoom Link\u003C\/a\u003E\u0026nbsp;(Meeting Code:\u0026nbsp;962 8999 0465)\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EYonghae Kim\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EPh.D. Computer Science\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Computer Science\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ECommittee:\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Hyesoon Kim (Advisor) - School of Computer Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Moinuddin Qureshi\u0026nbsp;- School of\u0026nbsp;Computer Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Taesoo Kim\u0026nbsp;- School of\u0026nbsp;Computer Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Jaekyu Lee - Arm\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EFor decades, memory safety issues have exposed substantial security threats to computer systems. Memory safety violations occur when instructions perform illegitimate memory accesses to a program\u0026rsquo;s address space. There are broadly two types of memory safety violations. If a memory access occurs outside of its allowed range, e.g., buffer overflow and out-of- bounds (OOB) access, it violates spatial memory safety. When a memory region is accessed after the region is no longer valid, temporal memory safety is violated, e.g., use-after-free (UAF). Despite long-term efforts to resolve, memory safety issues are still the most prevalent and problematic in the wild. Recent studies show that \u0026sim;70% of security vulnerabilities addressed in industry stemmed from memory violations. This dissertation\u0026nbsp;presents a\u0026nbsp;multidisciplinary\u0026nbsp;approach that addresses challenges of\u0026nbsp;previous memory safety solutions and achieves practical memory safety.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EFirst, we present\u0026nbsp;AOS, a low-overhead heap protection mechanism. AOS proposes a data-pointer signing scheme that utilizes the unused upper bits of a pointer for a security purpose. With the\u0026nbsp;proposed hardware\u0026nbsp;support, AOS achieves efficient metadata management and bounds checks transparently performed in hardware.\u0026nbsp;Second, we present RV-CURE, a RISC-V capability architecture that orchestrates compiler, architecture, and system designs for practical memory safety. RV-CURE proposes data-pointer tagging (DPT) that generalizes a\u0026nbsp;pointer-tagging method for all memory types, including stack, heap, and global memory. In addition, RV-CURE investigates efficient, lightweight hardware extensions for DPT based on the RISC-V BOOM core. Furthermore, DPT utilizes static taint analysis that enables identifying vulnerable (tainted) memory objects and enabling selective protection only to those.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Hardware-based Always-On Memory Safety"}],"uid":"27707","created_gmt":"2022-11-28 21:44:47","changed_gmt":"2022-11-28 21:44:47","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2022-11-29T09:30:00-05:00","event_time_end":"2022-11-29T11:30:00-05:00","event_time_end_last":"2022-11-29T11:30:00-05:00","gmt_time_start":"2022-11-29 14:30:00","gmt_time_end":"2022-11-29 16:30:00","gmt_time_end_last":"2022-11-29 16:30:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"102851","name":"Phd proposal"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}