A Haas, A Rossberg, DL Schuff, BL Titzer… - Proceedings of the 38th …, 2017 - dl.acm.org
The maturation of the Web platform has given rise to sophisticated and demanding Web applications such as interactive 3D visualization, audio and video software, and games. With …
N Burow, X Zhang, M Payer - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge, ie, indirect …
The C and C++ programming languages are notoriously insecure yet remain indispensable. Developers therefore resort to a multi-pronged approach to find security issues before …
S Jero, N Burow, B Ward, R Skowyra, R Khazan… - ACM Computing …, 2022 - dl.acm.org
Software security defenses are routinely broken by the persistence of both security researchers and attackers. Hardware solutions based on tagging are emerging as a …
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing defense mechanisms are inadequate; in general, the software-based approaches are not …
Optimized hardware for propagating and checking software-programmable metadata tags can achieve low runtime overhead. We generalize prior work on hardware tagging by …
SA Carr, M Payer - Proceedings of the 2017 ACM on Asia Conference …, 2017 - dl.acm.org
Applications written in C/C++ are prone to memory corruption, which allows attackers to extract secrets or gain control of the system. With the rise of strong control-flow hijacking …
T Zhang, D Lee, C Jung - Proceedings of the Twenty-Fourth International …, 2019 - dl.acm.org
A memory safety violation occurs when a program has an out-of-bound (spatial safety) or use-after-free (temporal safety) memory access. Given its importance as a security …
K Lu, C Song, T Kim, W Lee - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Operating system kernel is the de facto trusted computing base for most computer systems. To secure the OS kernel, many security mechanisms, eg, kASLR and StackGuard, have …