EvoIsolator: Evolving program slices for hardware isolation based security

Mengmei Ye, Myra B. Cohen, Witawas Srisa-an, Sheng Wei

Research output: Chapter in Book/Report/Conference proceedingConference contribution


To provide strong security support for today’s applications, microprocessor manufacturers have introduced hardware isolation, an on-chip mechanism that provides secure accesses to sensitive data. Currently, hardware isolation is still difficult to use by software developers because the process to identify access points to sensitive data is error-prone and can lead to under and over protection of sensitive data. Under protection can lead to security vulnerabilities. Over protection can lead to an increased attack surface and excessive communication overhead. In this paper we describe EvoIsolator, a search-based framework to (i) automatically generate executable minimal slices that include all access points to a set of specified sensitive data; and (ii) automatically optimize (for small code block size and low communication overhead) the code modules for hardware isolation. We demonstrate, through a small feasibility study, the potential impact of our proposed code optimizer.

Original languageEnglish (US)
Title of host publicationSearch-Based Software Engineering - 10th International Symposium, SSBSE 2018, Proceedings
EditorsPhil McMinn, Thelma Elita Colanzi
PublisherSpringer Verlag
Number of pages6
ISBN (Print)9783319992402
StatePublished - 2018
Externally publishedYes
Event10th International Symposium on Search-Based Software Engineering, SSBSE 2018 - Montpellier, France
Duration: Sep 8 2018Sep 10 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11036 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other10th International Symposium on Search-Based Software Engineering, SSBSE 2018

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


  • Genetic algorithms
  • Hardware security
  • Software transplantation


Dive into the research topics of 'EvoIsolator: Evolving program slices for hardware isolation based security'. Together they form a unique fingerprint.

Cite this