We propose preventing format-string attacks with a combination of static dataflow analysis and dynamic white-lists of safe address ranges. The dynamic nature of our white-lists provides the flexibility necessary to encode a very precise security policy—namely, that %n-specifiers in printf-style functions should modify a memory location x only if the programmer explicitly passes a pointer to x. Our static dataflow analysis and source transformations let us automatically maintain and check the white-list without any programmer effort—they merely need to change the Makefile. Our analysis also detects pointers passed to vprintfstyle functions through (possibly multiple layers of) wrapper functions. Our results establish that our approach provid...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
We present a new system for automatically detecting format string security vulnerabilities in C prog...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Abstract. Format-string attack is one of the few truly threats to software security. Many previous m...
Bu®er over°ow vulnerabilities are among the most widespread of security problems. Numerous incidents...
Abstract. Although Format String Attacks(FSAs) are known for many years there is still a number of a...
A longstanding issue in computer security is preventing an attacker from gaining arbitrary execution...
Whitebox fuzzing is a novel form of security testing based on runtime symbolic execution and constra...
Many vulnerable program suffer date-flow attack, for example buffer overflow and format string that ...
This article surveys representative techniques of exploiting bu#er overflow and format string overfl...
This white paper describes a significant new feature of libsafe version 2.0: the ability to detect a...
A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker ...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Despite the large number of proposed countermeasures against control-flow hijacking attacks, these a...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
We present a new system for automatically detecting format string security vulnerabilities in C prog...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Abstract. Format-string attack is one of the few truly threats to software security. Many previous m...
Bu®er over°ow vulnerabilities are among the most widespread of security problems. Numerous incidents...
Abstract. Although Format String Attacks(FSAs) are known for many years there is still a number of a...
A longstanding issue in computer security is preventing an attacker from gaining arbitrary execution...
Whitebox fuzzing is a novel form of security testing based on runtime symbolic execution and constra...
Many vulnerable program suffer date-flow attack, for example buffer overflow and format string that ...
This article surveys representative techniques of exploiting bu#er overflow and format string overfl...
This white paper describes a significant new feature of libsafe version 2.0: the ability to detect a...
A checksum (i.e., a cryptographic hash) of a file can be used as an integrity check, if an attacker ...
Buffer overflow vulnerabilities are the most prevalent security vulnerabilities; they are responsibl...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Despite the large number of proposed countermeasures against control-flow hijacking attacks, these a...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
We present a new system for automatically detecting format string security vulnerabilities in C prog...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...