In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application's control flow. We have implemented a prototype of our solution in a C-compiler for Linux. The evaluation shows that the overhead of using our countermeasure is small and the security benefits are substantial.status: publishe
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by ma...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
This paper proposes a methodology to develop countermeasures against code injection attacks, and val...
This paper proposes a methodology to develop coun-termeasures against code injection attacks, and va...
The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks exploit th...
Abstract—Memory corruption attacks continue to be a major vector of attack for compromising modern s...
Part 6: Source Code SecurityInternational audienceDespite being a more than 40-year-old dark art, co...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by att...
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. N...
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) ...
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) ...
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by ma...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. ...
This paper proposes a methodology to develop countermeasures against code injection attacks, and val...
This paper proposes a methodology to develop coun-termeasures against code injection attacks, and va...
The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks exploit th...
Abstract—Memory corruption attacks continue to be a major vector of attack for compromising modern s...
Part 6: Source Code SecurityInternational audienceDespite being a more than 40-year-old dark art, co...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by att...
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. N...
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) ...
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) ...
This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) ...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by ma...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...