For this #ThrowbackThursday, we will look at #ACSAC2023's #OS and #SoftwareSecurity session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/5
#OperatingSystemSecurity #SecureSoftware
First up in the session was Maar et al.'s "DOPE: #DOmain Protection Enforcement with #PKS" which proposes a method to protect kernel data with minimal overhead. (https://www.acsac.org/2023/program/final/s51.html) 2/5
#MemorySafety #LinuxKernelSecurity
ACSAC2023 Program – powered by OpenConf

Following that, we had Franzen et al.'s "RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis" proposing to use software diversity to #harden the #LinuxKernel against #AutomatedAnalysis.(https://www.acsac.org/2023/program/final/s276.html) 3/5
#KernelSecurity #ForensicAnalysis
ACSAC2023 Program – powered by OpenConf

In the session's third slot was Mahmud et al.'s "Attack of the Knights: Non Uniform #Cache #SideChannel #Attack" showcasing a novel distance-based #SideChannelAttack extracting #AES keys on an Intel Knights Landing #CPU.(https://www.acsac.org/2023/program/final/s301.html) 4/5
ACSAC2023 Program – powered by OpenConf

The final paper in this session was Ganz et al.'s "PAVUDI: Patch-based Vulnerability Discovery using Machine Learning" which proposes a machine-learning approach for identifying software vulnerabilities. (https://www.acsac.org/2023/program/final/s222.html) 5/5
#Cybersecurity #SecureSoftware #ML
ACSAC2023 Program – powered by OpenConf