Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve the secrecy and integrity guarantees for local memory. We follow the approach set out by Abadi and Plotkin (2010). We consider the execution of an idealized language in two environments. In the strict environment, opponents cannot access local variables of the user program. In the lax environment, opponents may attempt to guess allocated memory locations and thus, with small probability, gain access the local memory of the user program. We model these environments using two novel calculi: ??hashref and ??proberef. Our contribution to the Abadi-Plotkin program is to e...
Abstract—Through randomization of the memory space and the confinement of code to non-data pages, co...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
AbstractIn security, layout randomization is a popular, effective attack mitigation technique. Recen...
Abstract—Layout randomization is a powerful, popular tech-nique for software protection. We present ...
Software that is in use and under development today still contains as many bugs as ever. These bugs ...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques ...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
Constant parallel-time cryptography allows performing complex cryptographic tasks at an ultimate lev...
The problem of defending software against tampering by a malicious host is not expected to be solved...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...
Abstract—Fine-grained address space layout randomization (ASLR) has recently been proposed as a meth...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
Abstract—Through randomization of the memory space and the confinement of code to non-data pages, co...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
AbstractIn security, layout randomization is a popular, effective attack mitigation technique. Recen...
Abstract—Layout randomization is a powerful, popular tech-nique for software protection. We present ...
Software that is in use and under development today still contains as many bugs as ever. These bugs ...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques ...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
Constant parallel-time cryptography allows performing complex cryptographic tasks at an ultimate lev...
The problem of defending software against tampering by a malicious host is not expected to be solved...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Code reuse attacks such as return-oriented programming are one of the most powerful threats to conte...
Abstract—Fine-grained address space layout randomization (ASLR) has recently been proposed as a meth...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
Abstract—Through randomization of the memory space and the confinement of code to non-data pages, co...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
AbstractIn security, layout randomization is a popular, effective attack mitigation technique. Recen...