Abstract—The standard loader (ld.so) is a common target of attacks. The loader is a trusted component of the application, and faults in the loader are problematic; e.g., they may lead to local privilege escalation for SUID binaries. Software-based fault isolation (SFI) provides a framework to execute arbitrary code while protecting the host system. A problem of current approaches to SFI is that fault isolation is decoupled from the dynamic loader, which is treated as a black box. The sandbox has no information about the (expected) execution behavior of the application and the connections between different shared objects. As a consequence, SFI is limited in its ability to identify devious application behavior. This paper presents a new appro...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
Part 6: Software SecurityInternational audienceDynamically-linked libraries are widely adopted in ap...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
Executing untrusted code while preserving security requiresenforcement of memory and control-flow sa...
International audienceSoftware Fault Isolation (SFI) consists in transforming un-trusted code so tha...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
Abstract. The number of applications that are downloaded from the Internet and executed on-the-fly i...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
This thesis presents an innovative approach to implementing a security enforcement mechanism in the ...
Flaws in the standard libraries of secure sandboxes represent a major security threat to billions of...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...
Executing untrusted code while preserving security requires that thecode be prevented from modifying...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
Part 6: Software SecurityInternational audienceDynamically-linked libraries are widely adopted in ap...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
Executing untrusted code while preserving security requiresenforcement of memory and control-flow sa...
International audienceSoftware Fault Isolation (SFI) consists in transforming un-trusted code so tha...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
Abstract. The number of applications that are downloaded from the Internet and executed on-the-fly i...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
This thesis presents an innovative approach to implementing a security enforcement mechanism in the ...
Flaws in the standard libraries of secure sandboxes represent a major security threat to billions of...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...
Executing untrusted code while preserving security requires that thecode be prevented from modifying...
Programming has changed; programming languages have not. Modern software embraced reusable software ...
Abstract—Interface-confinement is a common mechanism that secures untrusted code by executing it ins...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
Part 6: Software SecurityInternational audienceDynamically-linked libraries are widely adopted in ap...