Skip to main content

Showing 1–5 of 5 results for author: Shacham, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.14246  [pdf, other

    cs.CR

    Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond

    Authors: Garrett Gu, Hovav Shacham

    Abstract: We claim that existing techniques and tools for generating and verifying constant-time code are incomplete, since they rely on assumptions that compiler optimization passes do not break constant-timeness or that certain operations execute in constant time on the hardware. We present the first end-to-end constant-time-aware compilation process that preserves constant-time semantics at every step fr… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  2. arXiv:2102.12730  [pdf, other

    cs.CR

    Swivel: Hardening WebAssembly against Spectre

    Authors: Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan

    Abstract: We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm) against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in-process sandbox and is, for example, used in production to isolate different clients on edge clouds and function-as-a-service platforms. Unfortunately, Spectre attacks can bypass Wasm's isolation guarantees. Swivel hardens Wasm agains… ▽ More

    Submitted 19 March, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX 21

    MSC Class: D.4.6 ACM Class: D.4.6

  3. arXiv:2007.14995  [pdf, other

    cs.CR

    Return-Oriented Programming in RISC-V

    Authors: Garrett Gu, Hovav Shacham

    Abstract: RISC-V is an open-source hardware ISA based on the RISC design principles, and has been the subject of some novel ROP mitigation technique proposals due to its open-source nature. However, very little work has actually evaluated whether such an attack is feasible assuming a typical RISC-V implementation. We show that RISC-V ROP can be used to perform Turing complete calculation and arbitrary funct… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

  4. arXiv:2003.00572  [pdf, other

    cs.CR

    Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)

    Authors: Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan

    Abstract: Firefox and other major browsers rely on dozens of third-party libraries to render audio, video, images, and other content. These libraries are a frequent source of vulnerabilities. To mitigate this threat, we are migrating Firefox to an architecture that isolates these libraries in lightweight sandboxes, dramatically reducing the impact of a compromise. Retrofitting isolation can be labor-inten… ▽ More

    Submitted 9 March, 2020; v1 submitted 1 March, 2020; originally announced March 2020.

    Comments: Accepted at Usenix Security 2020

    MSC Class: D.4.6 ACM Class: D.4.6

  5. arXiv:1912.02285  [pdf

    cs.CR

    Gobi: WebAssembly as a Practical Path to Library Sandboxing

    Authors: Shravan Narayan, Tal Garfinkel, Sorin Lerner, Hovav Shacham, Deian Stefan

    Abstract: Software based fault isolation (SFI) is a powerful approach to reduce the impact of security vulnerabilities in large C/C++ applications like Firefox and Apache. Unfortunately, practical SFI tools have not been broadly available. Developing SFI toolchains are a significant engineering challenge. Only in recent years have browser vendors invested in building production quality SFI tools like Nati… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    MSC Class: D.4.6 ACM Class: D.4.6