Protecting computing systems against cyberattacks should be put high on the agenda. For example, Colonial Pipeline, an American oil pipeline system, suffered a cyberattack that impacted its computerized equipment managing the pipeline, leading to a state of emergency declared by President Joe Biden in May, 2021. As reported by Microsoft Security Response Center, attackers are unanimously corrupting the stack and most Control Flow Guard (CFG) improvements will provide little value-add until stack protection loads. Shadow stacks play an important role in protecting backward edges (return addresses on the call stack) to mitigate Return-Oriented Programming (ROP) attacks. Control-Flow Integrity (CFI) techniques often focus on protecting forwa...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Shadow stacks are the go-to solution for perfect backward-edge control-flow integrity (CFI). Softwar...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow I...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Manipulations of return addresses on the stack are the basis for a variety of attacks on programs wr...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
AbstractWith software systems continuously growing in size and complexity, the number and variety of...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
C, C++ and most other popular low-level languages delegate memory management to the programmer, freq...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Shadow stacks are the go-to solution for perfect backward-edge control-flow integrity (CFI). Softwar...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow I...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Manipulations of return addresses on the stack are the basis for a variety of attacks on programs wr...
Presented on September 21, 2018 at 12:00 p.m. in the Engineered Biosystems Building, Room 1005.Natha...
AbstractWith software systems continuously growing in size and complexity, the number and variety of...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
Defenses such as Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and sta...
C, C++ and most other popular low-level languages delegate memory management to the programmer, freq...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Shadow stacks are the go-to solution for perfect backward-edge control-flow integrity (CFI). Softwar...
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vuln...