Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Launch a New Career with Certificates from Google, IBM & Microsoft
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about IUBIK (Isolating User Bytes in Commodity Operating System Kernels), a security mechanism that leverages Memory Tagging Extension technology to enhance kernel security by isolating user data within operating system kernels. Explore how this approach addresses critical security vulnerabilities in commodity operating systems by implementing memory isolation techniques that prevent unauthorized access to user data at the kernel level. Discover the technical implementation details of Memory Tagging Extension and understand how it can be integrated into existing kernel architectures to provide robust protection against various attack vectors. Examine the performance implications, security benefits, and practical considerations of deploying this isolation mechanism in real-world operating system environments. Gain insights into the challenges of maintaining data integrity and confidentiality in kernel space while ensuring system performance remains optimal.
Syllabus
268 IUBIK Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extension
Taught by
IEEE Symposium on Security and Privacy