Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of systems, leak sensitive data, or perform denial-of-service attacks. This plethora of vulnerabilities is caused by C/C++ not enforcing memory or type safety in language by design, instead they leave security checks to the programmer. Previous research primarily focuses on preventing control-flow hijack attacks. In a control-flow hijack attack, the attacker manipulates a return address or function pointer to cause code of her choosing to be executed. Abadi et al. propose Control- Flow Integrity (CFI), to prevent such attacks, but as our CFI survey shows, CFI mechanisms have varying degrees of precision. Researchers exploit the imprecision in CFI i...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
Memory corruption attacks have haunted computer systems for decades. Attackers abuse subtle bugs in ...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Adversaries exploit memory corruption vulnerabilities to hi-jack a program’s control flow and gain a...
Abstract—Several defenses have increased the cost of tradi-tional, low-level attacks that corrupt co...
Abstract-Several defenses have increased the cost of traditional, low-level attacks that corrupt con...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
Memory corruption attacks have haunted computer systems for decades. Attackers abuse subtle bugs in ...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
System programming languages such as C and C++ are ubiquitously used for systems software such as br...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Compilers are at the foundation of software security. On the one hand, compilers are an ideal place ...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Adversaries exploit memory corruption vulnerabilities to hi-jack a program’s control flow and gain a...
Abstract—Several defenses have increased the cost of tradi-tional, low-level attacks that corrupt co...
Abstract-Several defenses have increased the cost of traditional, low-level attacks that corrupt con...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corr...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
Memory corruption attacks have haunted computer systems for decades. Attackers abuse subtle bugs in ...