YoVDO

Limitations and Opportunities of Modern Hardware Isolation Mechanisms

Offered By: USENIX via YouTube

Tags

Computer Security Courses Memory Protection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an in-depth analysis of modern hardware isolation mechanisms in this 20-minute conference talk from USENIX ATC '24. Delve into the advantages and limitations of recent CPU technologies like Intel memory protection keys (MPK), ARM pointer authentication (PAC), ARM memory tagging extensions (MTE), and ARM Morello capabilities. Examine their suitability for isolating subsystems with tight performance budgets. Discover why these nascent technologies, despite being a significant step forward, still lack critical design principles for low-overhead isolation enforcement, zero-copy data exchange, and secure access permission revocation. Gain insights into the future of hardware-supported isolation for various systems, including browser plugins, device drivers, kernel extensions, user-defined database and network functions, and serverless cloud platforms.

Syllabus

USENIX ATC '24 - Limitations and Opportunities of Modern Hardware Isolation Mechanisms


Taught by

USENIX

Related Courses

Securing Digital Democracy
University of Michigan via Coursera
Computer Science 101
Stanford University via Coursera
Introduction to Cybersecurity for Business
University of Colorado System via Coursera
Proactive Computer Security
University of Colorado System via Coursera
How Computers Work
University of London International Programmes via Coursera