Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization

KZ Snow, F Monrose, L Davi… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Fine-grained address space layout randomization (ASLR) has recently been proposed as a
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …

Current challenges in automatic software repair

C Le Goues, S Forrest, W Weimer - Software quality journal, 2013 - Springer
The abundance of defects in existing software systems is unsustainable. Addressing them is
a dominant cost of software maintenance, which in turn dominates the life cycle cost of a …

Systems, methods, and media protecting a digital data processing device from attack

S Sidiroglou, AD Keromytis, SJ Stolfo - US Patent 8,407,785, 2013 - Google Patents
US PATENT DOCUMENTS 7,526,758 B2 4/2009 Hasse et al. 7,639,714 B2 12/2009 Stolfo
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …

System and methods for run time detection and correction of memory corruption

SV Gupta, P Shenoy - US Patent 8,510,596, 2013 - Google Patents
G06F11/0703—Error or fault processing not based on redundancy, ie by taking additional
measures to deal with the error or fault not making use of redundancy in operation, in …

Signature-free buffer overflow attack blocker

X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious
vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …

ASIST: architectural support for instruction set randomization

A Papadogiannakis, L Loutsis… - Proceedings of the …, 2013 - dl.acm.org
Code injection attacks continue to pose a threat to today's computing systems, as they
exploit software vulnerabilities to inject and execute arbitrary, malicious code. Instruction Set …

Diversifying the software stack using randomized NOP insertion

T Jackson, A Homescu, S Crane, P Larsen… - Moving Target Defense …, 2013 - Springer
Software monoculture is a significant liability from a computer security perspective. Single
attacks can ripple through networks and affect large numbers of vulnerable systems. A …

[PDF][PDF] Survey of cyber moving targets

H Okhravi, MA Rabe, TJ Mayberry, WG Leonard… - … Institute of Technology …, 2013 - mit.edu
This survey provides an overview of different cyber moving target techniques, their threat
models, and their technical details. A cyber moving target technique refers to any technique …

Beyond full disk encryption: Protection on security-enhanced commodity processors

M Henson, S Taylor - Applied Cryptography and Network Security: 11th …, 2013 - Springer
Modern computer systems exhibit a major weakness in that code and data are stored in the
clear, unencrypted, within random access memory. As a result, numerous vulnerabilities …

Protecting web browser extensions from javascript injection attacks

A Barua, M Zulkernine… - 2013 18th International …, 2013 - ieeexplore.ieee.org
Vulnerable web browser extensions can be used by an attacker to steal users' credentials
and lure users into leaking sensitive information to unauthorized parties. Current browser …