For this #ThrowbackThursday, we will look at #ACSAC2024's System Security session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6
Kicking off the session was Rösti et al.'s "I'll Be There for You! Perpetual Availability in the A^8 MVX System," showcasing breakthroughs in attack detection and recovery for critical software. (https://www.acsac.org/2024/program/final/s73.html) 2/6
#CyberSecurity #MVX
Second up was Kleftogiorgos et al.'s "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software", showcasing reduced latency and enhanced security using Sidecar on modern processors. (https://www.acsac.org/2024/program/final/s131.html) 3/6
#Debugging #CyberSecurity
Third in the session was Li et al.'s "Rust for Linux: Understanding Security Impact of Rust on the Linux Kernel," highlighting Rust's ability to eliminate many safety-related vulnerabilities in device drivers. (https://www.acsac.org/2024/program/final/s480.html) 4/6
#RustLang #KernelSecurity
Following that was Caulfield et al.'s "SpecCFA: Enhancing Control Flow Attestation and Auditing via Application-Aware Sub-Path Speculation," a novel approach optimizing control flow attestation for resource-constrained MCUs. (https://www.acsac.org/2024/program/final/s84.html) 5/6
#ControlFlowAttestation
The last paper presented was Yen et al.'s "SECvma: Virtualization-based Linux Kernel Protection for Arm," which introduces a new system for protecting the #Linux kernel's code integrity and confidentiality using virtualization. (https://www.acsac.org/2024/program/final/s240.html) 6/6
#KernelSecurity