Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

Sok: Eternal war in memory

L Szekeres, M Payer, T Wei… - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …

The SeaHorn verification framework

A Gurfinkel, T Kahsai, A Komuravelli… - … Conference on Computer …, 2015 - Springer
In this paper, we present SeaHorn, a software verification framework. The key distinguishing
feature of SeaHorn is its modular design that separates the concerns of the syntax of the …

SoK: Sanitizing for security

D Song, J Lettner, P Rajasekaran, Y Na… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …

RustHorn: CHC-based verification for Rust programs

Y Matsushita, T Tsukada, N Kobayashi - ACM Transactions on …, 2021 - dl.acm.org
Reduction to satisfiability of constrained Horn clauses (CHCs) is a widely studied approach
to automated program verification. Current CHC-based methods, however, do not work very …

Runtime countermeasures for code injection attacks against C and C++ programs

Y Younan, W Joosen, F Piessens - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
The lack of memory safety in C/C++ often leads to vulnerabilities. Code injection attacks
exploit these vulnerabilities to gain control over the execution flow of applications. These …

Making context-sensitive points-to analysis with heap cloning practical for the real world

C Lattner, A Lenharth, V Adve - ACM SIGPLAN Notices, 2007 - dl.acm.org
Context-sensitive pointer analysis algorithms with full" heapcloning" are powerful but are
widely considered to be too expensive to include in production compilers. This paper shows …

Backwards-compatible array bounds checking for C with very low overhead

D Dhurjati, V Adve - Proceedings of the 28th international conference on …, 2006 - dl.acm.org
The problem of enforcing correct usage of array and pointer references in C and C++
programs remains unsolved. The approach proposed by Jones and Kelly (extended by …

A general solution to the P4P problem for camera with unknown focal length

M Bujnak, Z Kukelova, T Pajdla - 2008 IEEE Conference on …, 2008 - ieeexplore.ieee.org
This paper presents a general solution to the determination of the pose of a perspective
camera with unknown focal length from images of four 3D reference points. Our problem is a …

Secure virtual architecture: A safe execution environment for commodity operating systems

J Criswell, A Lenharth, D Dhurjati, V Adve - Proceedings of twenty-first …, 2007 - dl.acm.org
This paper describes an efficient and robust approach to provide a safe execution
environment for an entire operating system, such as Linux, and all its applications. The …