Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

[PDF][PDF] Preventing Use-after-free with Dangling Pointers Nullification.

B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee - NDSS, 2015 - compsec.snu.ac.kr
Many system components and network applications are written in languages that are prone
to memory corruption vulnerabilities. There have been countless cases where simple …

Enforcing unique code target property for control-flow integrity

H Hu, C Qian, C Yagemann, SPH Chung… - Proceedings of the …, 2018 - dl.acm.org
The goal of control-flow integrity (CFI) is to stop control-hijacking attacks by ensuring that
each indirect control-flow transfer (ICT) jumps to its legitimate target. However, existing …

[PDF][PDF] MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.

Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma… - NDSS, 2018 - ndss-symposium.org
In this paper, we develop a model based causality inference technique for audit logging that
does not require any application instrumentation or kernel modification. It leverages a recent …

Rain: Refinable attack investigation with on-demand inter-process information flow tracking

Y Ji, S Lee, E Downing, W Wang, M Fazzini… - Proceedings of the …, 2017 - dl.acm.org
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …

[PDF][PDF] How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.

K Lu, W Lee, S Nürnberger, M Backes - NDSS, 2016 - cs.umd.edu
Existing techniques for memory randomization such as the widely explored Address Space
Layout Randomization (ASLR) perform a single, per-process randomization that is applied …

{TaintPipe}: Pipelined symbolic taint analysis

J Ming, D Wu, G **
D Liu, M Zhang, H Wang - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Applications in C/C++ are notoriously prone to memory corruptions. With significant research
efforts devoted to this area of study, the security threats posed by previously popular …