Abstract—Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as practical control flow integrity have been shown to be ineffective. A recent technique called code pointer integrity (CPI) promises to balance security and performance by focusing memory safety on code pointers thus preventing most control-hijacking attacks while maintaining low overhead. CPI protects access to code pointers by storing them in a safe region that is protected by instructi...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. N...
Systems code is often written in low-level languages like C/C++, which offer many benefits but also ...
Systems code is often written in low-level languages like C/C++, which offer many benefits but also ...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
In this paper we present an efficient countermeasure against code injection attacks. Our countermeas...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. N...
Systems code is often written in low-level languages like C/C++, which offer many benefits but also ...
Systems code is often written in low-level languages like C/C++, which offer many benefits but also ...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
In this paper we present an efficient countermeasure against code injection attacks. Our countermeas...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Me...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...