The security of computer systems depends in a fundamental way on the validity of assumptions made by the systems' designers. Assumptions made about attacker capabilities have a tendency to turn out false and many computer systems are insecure as a direct consequence. This is especially true with memory-safety vulnerabilities whereby an attacker is able to violate the memory-safety guarantees of a software system. Here, system designers have assumed that defenses against code injection or certain other forms of data corruption are sufficient to stop a determined attacker. In this dissertation, I will examine several instances where a system's designer incorrectly assumed that an ad hoc defense against attackers was sufficient to defend the s...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a co...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
The security of computer systems depends in a fundamental way on the validity of assumptions made by...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Computers are often subject to external attacks that aim to control software behavior. Typically, su...
The chapter introduces and describes representative defense mechanisms to protect from both basic an...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
An important objective for low-level software security research is to develop techniques that make i...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
Abstract. An important objective for low-level software security research is to develop techniques t...
In recent years, researchers have proposed systems for running trusted code on an untrusted operatin...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a co...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
The security of computer systems depends in a fundamental way on the validity of assumptions made by...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Computers are often subject to external attacks that aim to control software behavior. Typically, su...
The chapter introduces and describes representative defense mechanisms to protect from both basic an...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
An important objective for low-level software security research is to develop techniques that make i...
Memory vulnerabilities and bugs become one of the most severe problem in today's system security.Due...
Abstract. An important objective for low-level software security research is to develop techniques t...
In recent years, researchers have proposed systems for running trusted code on an untrusted operatin...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Exploitation of memory-corruption vulnerabilities in widely-used software has been a threat for over...
In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a co...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...