Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.Includes bibliographical references (p. 77-82).We present program shepherding, a method for monitoring control flow transfers during program execution in order to enforce a security policy. Program shepherding provides three basic techniques as building blocks for security policies. First, program shepherding can restrict execution privileges on the basis of code origins. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. Second, shepherding can restrict control transfers based on instruction type, source, and target. Finally, shepherding guarante...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
The computer security problems that we face begin in computer programs that we write. The exploitat...
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly...
We present program shepherding, a method for monitoring control flow transfers dur-ing program execu...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Computer Security has been a pressing issue that affects our society in multiple ways. Although a pl...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
Computer security is a topic of paramount importance in computing today. Though enormous effort has ...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
The computer security problems that we face begin in computer programs that we write. The exploitat...
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly...
We present program shepherding, a method for monitoring control flow transfers dur-ing program execu...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Computer Security has been a pressing issue that affects our society in multiple ways. Although a pl...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
Computer security is a topic of paramount importance in computing today. Though enormous effort has ...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Abstract: Many modern embedded systems use networks to communicate. This increases the attack surfa...
There are several ways to mitigate security breaches proactively. This thesis introduces portable se...
The computer security problems that we face begin in computer programs that we write. The exploitat...
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly...