Trustzone: Integrated hardware and software security, 2004. ,
, ARM Limited. 2012. ARM Architecture Reference Manual. ARMv7-A and ARMv7-R edition. ARM Limited
SLAM and Static Driver Verifier: Technology transfer of formal methods inside Microsoft, International Conference on Integrated Formal Methods, 2004. ,
Checking for race conditions in file accesses, Computing systems, vol.2, issue.2, 1996. ,
Shattering Illusions in Lock-Free Worlds-Compiler and Hardware behaviors in OSes and VMs, Black Hat Briefings, 2013. ,
Software Grand Exposure: SGX Cache Attacks Are Practical, WOOT, 2017. ,
EXE: automatically generating inputs of death, ACM Transactions on Information and System Security, 2008. ,
Exploiting UNIX file-system races via algorithmic complexity attacks, S&P, 2009. ,
CRASHME: Random input testing, 1996. ,
Detecting Privileged Side-Channel Attacks in Shielded Execution with DéJà Vu, AsiaCCS, 2017. ,
Rationale for international standard, Programming languages-C, 1999. ,
Inputfinder: Reverse engineering closed binaries using hardware performance counters, 5th Program Protection and Reverse Engineering Workshop, 2015. ,
RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities, USENIX Security Symposium, 2001. ,
, , 2008.
Effective Data-race Detection for the Kernel, OSDI, 2010. ,
Energyoptimal synchronization primitives for single-chip multi-processors, 19th ACM Great Lakes symposium on VLSI, 2009. ,
FastTrack: Efficient and Precise Dynamic Race Detection, Commun. ACM, 2010. ,
An empirical study of the robustness of Windows NT applications using random testing, 4th USENIX Windows System Symposium, 2000. ,
Taint-based directed whitebox fuzzing, 31st International Conference on Software Engineering, 2009. ,
Enhancing fuzzing technique for OKL4 syscalls testing, Sixth International Conference on Availability, Reliability and Security, 2011. ,
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware, Journal of Cryptographic Engineering, 2016. ,
Random testing for security: blackbox vs. whitebox fuzzing, 2nd International Workshop on Random Testing, 2007. ,
Grammar-based whitebox fuzzing, ACM Sigplan Notices, vol.43, pp.206-215, 2008. ,
DART: directed automated random testing, ACM Sigplan Notices, vol.40, pp.213-223, 2005. ,
SAGE: whitebox fuzzing for security testing, Queue, vol.10, p.20, 2012. ,
Performance and energy analysis of the restricted transactional memory implementation on haswell, IEEE IPDPS, 2014. ,
Cache Attacks on Intel SGX, 2017. ,
Flush+Flush: A Fast and Stealthy Cache Attack, 2016. ,
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory, USENIX Security Symposium, 2017. ,
Protecting private keys against memory disclosure attacks using hardware transactional memory, S&P, 2015. ,
Cache GamesBringing Access-Based Cache Attacks on AES to Practice, S&P, 2011. ,
DOI : 10.1109/sp.2011.22
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations, USENIX Security Symposium, 2013. ,
Transactional memory, Synthesis Lectures on Computer Architecture, vol.5, pp.1-263, 2010. ,
Intel Architecture Instruction Set Extensions Programming Reference, 2012. ,
Intel 64 and IA-32 Architectures Optimization Reference Manual, 2017. ,
Usb device drivers: A stepping stone into your kernel, IEEE European Conference on Computer Network Defense, 2010. ,
DOI : 10.1109/ec2nd.2010.16
Trinity: A system call fuzzer, 13th Ottawa Linux Symposium, 2011. ,
Identifying and exploiting windows kernel race conditions via memory access patterns, 2013. ,
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing, 10th Joint Meeting on Foundations of Software Engineering, 2015. ,
Comparing operating systems using robustness benchmarks, 16th Symposium on Reliable Distributed Systems, 1997. ,
DOI : 10.1109/reldis.1997.632800
URL : http://www.ece.cmu.edu/~koopman/ballista/srds97/preprint.pdf
HAFT: Hardware-assisted fault tolerance, 2016. ,
Detection of file-based race conditions, International Journal of Information Security, vol.4, p.1, 2005. ,
DOI : 10.1007/s10207-004-0068-2
OP-TEE: Open Portable Trusted Execution Environment, 2016. ,
ARMageddon: Cache Attacks on Mobile Devices, USENIX Security Symposium, 2016. ,
Concurrent and consistent virtual machine introspection with hardware transactional memory, IEEE International Symposium on High Performance Computer Architecture (HPCA), 2014. ,
DOI : 10.1109/hpca.2014.6835951
Testing system virtual machines, 19th International Symposium on Software Testing and Analysis, 2010. ,
DOI : 10.1145/1831708.1831730
Innovative instructions and software model for isolated execution, HASP@ ISCA, 2013. ,
Fuzzing wi-fi drivers to locate security vulnerabilities, IEEE EDCC, 2008. ,
An empirical study of the robustness of macos applications using random testing, 1st International Workshop on Random Testing, 2006. ,
An empirical study of the reliability of UNIX utilities, Commun. ACM, 1990. ,
Fuzz revisited: A reexamination of the reliability of UNIX utilities and services, 1995. ,
CWE-365: Race Condition in Switch, 2017. ,
CacheZoom: How SGX Amplifies The Power of Cache Attacks, 2017. ,
Racehound: Data race detector for Linux kernel modules, 2015. ,
IOzone filesystem benchmark, 2016. ,
Cache Attacks and Countermeasures: the Case of AES, 2006. ,
Protecting applications against TOCTTOU races by user-space caching of file metadata, ACM SIGPLAN Notices, 2012. ,
Operating system transactions, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, 2009. ,
Efficient On-the-fly Data Race Detection in Multithreaded C++ Programs, 2003. ,
MultiRace: Efficient On-the-fly Data Race Detection in Multithreaded C++ Programs: Research Articles, Concurr. Comput. : Pract. Exper, 2007. ,
Vuzzer: Application-aware evolutionary fuzzing, NDSS, 2017. ,
Eraser: A Dynamic Data Race Detector for Multithreaded Programs, ACM Transactions on Computer Systems, 1997. ,
Model checking an entire linux distribution for security violations, Computer Security Applications Conference, 2005. ,
Malware Guard Extension: Using SGX to Conceal Cache Attacks, DIMVA, 2017. ,
MS08-061 : The case of the kernel mode double-fetch, 2008. ,
T-SGX: Eradicating controlled-channel attacks against enclave programs, NDSS, 2017. ,
Driller: Augmenting Fuzzing Through Selective Symbolic Execution, NDSS, 2016. ,
Preventing race condition attacks on file-systems, ACM Symposium on Applied Computing, 2005. ,
syzkaller-linux syscall fuzzer, 2016. ,
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel, USENIX Security Symposium, 2017. ,
perf fuzzer: Targeted fuzzing of the perf_event_open() system call, 2015. ,
TOCTTOU Vulnerabilities in UNIX-style File Systems: An Anatomical Study, FAST, 2005. ,
AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves, ESORICS, 2016. ,
Acculock: Accurate and Efficient Detection of Data Races, CGO, 2011. ,
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels, S&P, 2018. ,
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, S&P, 2015. ,
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, USENIX Security Symposium, 2014. ,
Performance evaluation of Intel® transactional synchronization extensions for highperformance computing, International Conference on High Performance Computing, Networking, Storage and Analysis, 2013. ,
RaceTrack: Efficient Detection of Data Race Conditions via Adaptive Tracking, SOSP, 2005. ,
Employing Hardware Transactional Memory in, 2015. ,