SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …
[PDF][PDF] N-Variant Systems: A Secretless Framework for Security through Diversity.
We present an architectural framework for systematically using automated diversity to
provide high assurance detection and disruption for large classes of attacks. The framework …
provide high assurance detection and disruption for large classes of attacks. The framework …
[ΒΙΒΛΙΟ][B] C++ coding standards: 101 rules, guidelines, and best practices
H Sutter, A Alexandrescu - 2004 - books.google.com
Consistent, high-quality coding standards improve software quality, reduce time-to-market,
promote teamwork, eliminate time wasted on inconsequential matters, and simplify …
promote teamwork, eliminate time wasted on inconsequential matters, and simplify …
Randomized instruction set emulation
Injecting binary code into a running program is a common form of attack. Most defenses
employ a “guard the doors” approach, blocking known mechanisms of code injection …
employ a “guard the doors” approach, blocking known mechanisms of code injection …
SmashGuard: A hardware solution to prevent security attacks on the function return address
H Ozdoganoglu, TN Vijaykumar… - IEEE Transactions …, 2006 - ieeexplore.ieee.org
A buffer overflow attack is perhaps the most common attack used to compromise the security
of a host. This attack can be used to change the function return address and redirect …
of a host. This attack can be used to change the function return address and redirect …
Enhancing software reliability with speculative threads
J Oplinger, MS Lam - ACM SIGARCH Computer Architecture News, 2002 - dl.acm.org
This paper advocates the use of a monitor-and-recover programming paradigm to enhance
the reliability of software, and proposes an architectural design that allows software and …
the reliability of software, and proposes an architectural design that allows software and …
Vulnerability discovery with attack injection
The increasing reliance put on networked computer systems demands higher levels of
dependability. This is even more relevant as new threats and forms of attack are constantly …
dependability. This is even more relevant as new threats and forms of attack are constantly …
多变体执行安全防御技术研究综述
姚东, 张铮, 张高斐, 刘浩, 潘传幸, 邬江兴 - 信息安全学报, 2020 - jcs.iie.ac.cn
软件和信息系统的高速发展在给人们生活带来诸多便利的同时, 也让更多的安全风险来到了我们
身边, 不法分子可以很方便的利用无处不在的网络和越来越自动化, 低门槛的攻击技术去获得 …
身边, 不法分子可以很方便的利用无处不在的网络和越来越自动化, 低门槛的攻击技术去获得 …
Venerable variadic vulnerabilities vanquished
P Biswas, A Di Federico, SA Carr… - 26th USENIX Security …, 2017 - usenix.org
Programming languages such as C and C++ support variadic functions, ie, functions that
accept a variable number of arguments (eg, printf). While variadic functions are flexible, they …
accept a variable number of arguments (eg, printf). While variadic functions are flexible, they …
Large-scale analysis of format string vulnerabilities in debian linux
K Chen, D Wagner - Proceedings of the 2007 workshop on …, 2007 - dl.acm.org
Format-string bugs are a relatively common security vulnerability, and can lead to arbitrary
code execution. In collaboration with others, we designed and implemented a system to …
code execution. In collaboration with others, we designed and implemented a system to …