Z., Sivaramakrishnan, R., Smentek, D., and Wicki, T.
(2015). M7: Oracle’s Next-Generation Sparc Proces-
sor. IEEE Micro, 35:36–45.
Ainsworth, S. and Jones, T. M. (2020). MarkUs: Drop-in
use-after-free prevention for low-level languages. In
S&P, pages 578–591.
Akritidis, P., Cadar, C., Raiciu, C., Costa, M., and Castro,
M. (2008). Preventing Memory Error Exploits with
WIT. In S&P, pages 263–277.
Akritidis, P., Costa, M., Castro, M., and Hand, S.
(2009). Baggy Bounds Checking: An Efficient
and Backwards-Compatible Defense against Out-of-
Bounds Errors. In USENIX Security Symposium,
pages 51–66.
AMD (2020). Amd sev-snp: Strengthening vm
isolation with integrity protection and more.
https://www.amd.com/system/files/TechDocs/SEV-
SNP-strengthening-vm-isolation-with-integrity-
protection-and-more.pdf. Accessed 2023-01-05.
ARM Limited (2019). Arm architecture reference
manual for a-profile architecture, v8.5a. https://
developer.arm.com/documentation/ddi0487/ea. Ac-
cessed 2023-01-05.
Bernhard, L., Rodler, M., Holz, T., and Davi, L. (2022).
xTag: Mitigating Use-After-Free Vulnerabilities via
Software-Based Pointer Tagging on Intel x86-64. In
EURO S&P, pages 502–519.
Bletsch, T. K., Jiang, X., Freeh, V. W., and Liang, Z. (2011).
Jump-oriented programming: a new class of code-
reuse attack. In AsiaCCS, pages 30–40.
Burow, N., McKee, D. P., Carr, S. A., and Payer, M.
(2018). CUP: Comprehensive User-Space Protection
for C/C++. In AsiaCCS, pages 381–392.
Conti, M., Crane, S., Davi, L., Franz, M., Larsen, P., Ne-
gro, M., Liebchen, C., Qunaibit, M., and Sadeghi,
A. (2015). Losing Control: On the Effectiveness of
Control-Flow Integrity under Stack Attacks. In CCS,
pages 952–963.
Devietti, J., Blundell, C., Martin, M. M. K., and Zdancewic,
S. (2008). Hardbound: architectural support for spa-
tial safety of the C programming language. In ASP-
LOS, pages 103–114.
Duck, G. J. and Yap, R. H. C. (2016). Heap bounds protec-
tion with low fat pointers. In CC, pages 132–142.
Duck, G. J., Yap, R. H. C., and Cavallaro, L. (2017). Stack
Bounds Protection with Low Fat Pointers. In NDSS.
Durumeric, Z., Kasten, J., Adrian, D., Halderman, J. A.,
Bailey, M., Li, F., Weaver, N., Amann, J., Beekman,
J., Payer, M., and Paxson, V. (2014). The Matter
of Heartbleed. In Proceedings of the 2014 Internet
Measurement Conference, IMC 2014, Vancouver, BC,
Canada, November 5-7, 2014, pages 475–488.
Farkhani, R. M., Ahmadi, M., and Lu, L. (2021). PTAuth:
Temporal Memory Safety via Robust Points-to Au-
thentication. In USENIX Security Symposium, pages
1037–1054.
Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson,
W., Paul, W., Calandrino, J. A., Feldman, A. J., Ap-
pelbaum, J., and Felten, E. W. (2008). Lest We Re-
member: Cold Boot Attacks on Encryption Keys. In
USENIX Security Symposium, pages 45–60.
Hu, H., Shinde, S., Adrian, S., Chua, Z. L., Saxena, P., and
Liang, Z. (2016). Data-Oriented Programming: On
the Expressiveness of Non-control Data Attacks. In
S&P, pages 969–986.
Intel®(2020). Architecture Specification: Intel®
Trust Domain Extensions (Intel® TDX) Mod-
ule. https://www.intel.com/content/dam/develop/
external/us/en/documents/intel-tdx-module-1eas.pdf.
Accessed: 2023-01-30.
Intel®(2022). Intel® Architecture Memory Encryption
Technologies. https://www.intel.com/content/www/
us/en/content-details/679154/intel-architecture-
memory-encryption-technologies-specification.html.
Revision 1.4, Accessed: 2023-01-31.
Intel®(2023). Intel® Trust Domain Extensions.
https://www.intel.com/content/dam/develop/external/
us/en/documents/tdx-whitepaper-v4.pdf. Accessed:
2023-01-30.
Jero, S., Burow, N., Ward, B. C., Skowyra, R., Khazan, R.,
Shrobe, H. E., and Okhravi, H. (2023). TAG: Tagged
Architecture Guide. ACM Comput. Surv., 55:124:1–
124:34.
Jim, T., Morrisett, J. G., Grossman, D., Hicks, M. W., Ch-
eney, J., and Wang, Y. (2002). Cyclone: A Safe Di-
alect of C. In USENIX ATC, pages 275–288.
Joannou, A., Woodruff, J., Kovacsics, R., Moore, S. W.,
Bradbury, A., Xia, H., Watson, R. N. M., Chisnall, D.,
Roe, M., Davis, B., Napierala, E., Baldwin, J., Gudka,
K., Neumann, P. G., Mazzinghi, A., Richardson, A.,
Son, S. D., and Markettos, A. T. (2017). Efficient
Tagged Memory. In ICCD, pages 641–648.
Kaplan, D., Powell, J., and Woller, T. (2020). Amd sev-
snp: Strengthening vm isolationwith integrity protec-
tion and more. Technical report, Technical Report.
Advanced Micro Devices Inc.
Kim, Y., Lee, J., and Kim, H. (2020). Hardware-based
Always-On Heap Memory Safety. In MICRO, pages
1153–1166.
Lee, B., Song, C., Jang, Y., Wang, T., Kim, T., Lu, L., and
Lee, W. (2015). Preventing Use-after-free with Dan-
gling Pointers Nullification. In NDSS.
LeMay, M., Rakshit, J., Deutsch, S., Durham, D. M.,
Ghosh, S., Nori, A., Gaur, J., Weiler, A., Sultana,
S., Grewal, K., and Subramoney, S. (2021). Cryp-
tographic Capability Computing. In MICRO, pages
253–267.
Microsoft (2019). Trends, challenges, and strategic shifts in
the software vulnerability mitigation landscape. https:
//github.com/Microsoft/MSRC-Security-Research/
blob/master/presentations/2019 02 BlueHatIL/
2019 01%20-%20BlueHatIL%20-%20Trends%
2C%20challenge%2C%20and%20shifts%20in%
20software%20vulnerability%20mitigation.pdf.
Accessed 2023-01-05.
Microsoft (2022). mimalloc. hhttps://github.com/
microsoft/mimalloc. Accessed 2023-01-05.
Nagarakatte, S., Martin, M. M. K., and Zdancewic, S.
(2012). Watchdog: Hardware for safe and secure man-
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
35