This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019Cataloged from student-submitted PDF version of thesis.Includes bibliographical references (pages 79-83).Computer programmers use custom memory allocators as an alternative to built-in or general-purpose memory allocators with the intent to improve performance and minimize human error. However, it is difficult to achieve both memory safety and performance gains on custom memory allocators. In this thesis, we study the relationship between memory safety and custom allocators. We ana...
Performance requirements drive many of our most difficult design choices. In memory management, such...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...
Using custom memory allocators is an efficient performance optimization technique. However, dependen...
Programmers hoping to achieve performance improvements often use custom memory allocators. This in-d...
Heap-based attacks depend on a combination of memory manage-ment errors and an exploitable memory al...
With ever-increasing complexity of software systems, the number of reported security issues increase...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
In spite of years of improvements to software security, heap-related attacks still remain a severe t...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
Performance requirements drive many of our difficult design choices. Memory management is an area wh...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
Performance requirements drive many of our most difficult design choices. In memory management, such...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...
Using custom memory allocators is an efficient performance optimization technique. However, dependen...
Programmers hoping to achieve performance improvements often use custom memory allocators. This in-d...
Heap-based attacks depend on a combination of memory manage-ment errors and an exploitable memory al...
With ever-increasing complexity of software systems, the number of reported security issues increase...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
In spite of years of improvements to software security, heap-related attacks still remain a severe t...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
Performance requirements drive many of our difficult design choices. Memory management is an area wh...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
Performance requirements drive many of our most difficult design choices. In memory management, such...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Users are relying increasingly on untrusted software in their daily activities such as viewing docum...