Hardware-Assisted Software Security
The growth in computing power has increased software complexity, making it challenging to ensure the security of modern programs. To mitigate this, integrity and isolation techniques have been proposed. However, software-based implementation often incurs significant performance overhead. The hardware-based implementation provides a more efficient alternative, such as our research group's proposed hardware extensions for Control-Flow Integrity. Hardware-based isolation also enables remote attestation and facilitates the creation of enclave computing.
Our research group has extensively explored topics related to enclave computing, including memory corruption and side-channel attacks, hardware-assisted Control-Flow Integrity, and various attestation schemes, including Swarm Attestation.