Acknowledgement
This research was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government, Minitry of Science and ICT (MSIT) (RS-2023-00277326), the BK21 FOUR program of the Education and Research Program for Future ICT Pioneers, Seoul national University in 2024, and Inter-University Semiconductor Research Center (ISRC); in part by the Institute of Information & Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (RS-2024-00438729, Development of Full Lifecycle Privacy-Preserving Techniques using Anonymized Confidential Computing); and in part by Korea Planning & Evaluation Institute of Industrial Technology(KEIT) grant funded by the Korea governement(MOTIE) (No. RS-2024-00406121, Development of an Automotive Security Vulnerability-based Thread Analysis System (R&D)); and in part by IITP under the artificial intelligence semiconductor support program to nurture the best talents(IITP-2023-RS-2023-00256081) grant funded by the Korea government (MSIT).
References
- Bang et. al., TRUST: A CompilationFramework for In-process Isolation to ProtectSafe Rust aginst Untrusted Code, USENIXSecurity Symposium, Anaheim, CA, USA, 2023, pg.6947-6964
- Mergendahl et. al., Cross Language Attacks, Network and Distributed Systems SecuritySymposium, San Diego, CA, USA, 2022
- Rivera et. al., Keeping Safe Rust Safe withGaleed, Annual Computer Security Applications Conference, Virtual Event, USA, 2021
- Kirth et. al., PKRU-Safe: Automatically Locking Down the Heap Between Safe and Unsafe Langauges, European Conference on Computer Systems, Rennes, France, 2022, pg.132 - 148