SoK: Sanitizing for security

D Song, J Lettner, P Rajasekaran, Y Na… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …

How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors

X Cheng, X Nie, N Li, H Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning and its promising branch deep learning have proven to be effective in a
wide range of application domains. Recently, several efforts have shown success in …

Hardware-based always-on heap memory safety

Y Kim, J Lee, H Kim - 2020 53rd Annual IEEE/ACM …, 2020 - ieeexplore.ieee.org
Memory safety violations, caused by illegal use of pointers in unsafe programming
languages such as C and C++, have been a major threat to modern computer systems …

Bogo: Buy spatial memory safety, get temporal memory safety (almost) free

T Zhang, D Lee, C Jung - Proceedings of the Twenty-Fourth International …, 2019 - dl.acm.org
A memory safety violation occurs when a program has an out-of-bound (spatial safety) or
use-after-free (temporal safety) memory access. Given its importance as a security …

Blankit library debloating: Getting what you want instead of cutting what you don't

C Porter, G Mururu, P Barua, S Pande - Proceedings of the 41st ACM …, 2020 - dl.acm.org
Modern software systems make extensive use of libraries derived from C and C++. Because
of the lack of memory safety in these languages, however, the libraries may suffer from …

No-FAT: Architectural support for low overhead memory safety checks

MTI Ziad, MA Arroyo, E Manzhosov… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Memory safety continues to be a significant software reliability and security problem, and low
overhead and low complexity hardware solutions have eluded computer designers. In this …

In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection

S Xu, W Huang, D Lie - Proceedings of the 26th ACM international …, 2021 - dl.acm.org
Programming languages like C and C++ are not memory-safe because they provide
programmers with low-level pointer manipulation primitives. The incorrect use of these …

Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by {Developer-Implemented} Type Checks

Y Zhai, Z Qian, C Song, M Sridharan, T Jaeger… - 33rd USENIX Security …, 2024 - usenix.org
Type confusion occurs when C or C++ code accesses an object after casting it to an
incompatible type. The security impacts of type confusion vulnerabilities are significant …

Practical byte-granular memory blacklisting using califorms

H Sasaki, MA Arroyo, MTI Ziad, K Bhat… - Proceedings of the …, 2019 - dl.acm.org
Recent rapid strides in memory safety tools and hardware have improved software quality
and security. While coarse-grained memory safety has improved, achieving memory safety …

A Dependent Nominal Physical Type System for Static Analysis of Memory in Low Level Code

J Simonnet, M Lemerre, M Sighireanu - Proceedings of the ACM on …, 2024 - dl.acm.org
We tackle the problem of checking non-proof-carrying code, ie automatically proving type-
safety (implying in our type system spatial memory safety) of low-level C code or of machine …