SoK: Sanitizing for security

D Song, J Lettner, P Rajasekaran, Y Na… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …

[PDF][PDF] N-Variant Systems: A Secretless Framework for Security through Diversity.

B Cox, D Evans, A Filipi, J Rowanhill, W Hu… - USENIX Security …, 2006 - usenix.org
We present an architectural framework for systematically using automated diversity to
provide high assurance detection and disruption for large classes of attacks. The framework …

[ΒΙΒΛΙΟ][B] C++ coding standards: 101 rules, guidelines, and best practices

H Sutter, A Alexandrescu - 2004 - books.google.com
Consistent, high-quality coding standards improve software quality, reduce time-to-market,
promote teamwork, eliminate time wasted on inconsequential matters, and simplify …

Randomized instruction set emulation

EG Barrantes, DH Ackley, S Forrest… - ACM Transactions on …, 2005 - dl.acm.org
Injecting binary code into a running program is a common form of attack. Most defenses
employ a “guard the doors” approach, blocking known mechanisms of code injection …

SmashGuard: A hardware solution to prevent security attacks on the function return address

H Ozdoganoglu, TN Vijaykumar… - IEEE Transactions …, 2006 - ieeexplore.ieee.org
A buffer overflow attack is perhaps the most common attack used to compromise the security
of a host. This attack can be used to change the function return address and redirect …

Enhancing software reliability with speculative threads

J Oplinger, MS Lam - ACM SIGARCH Computer Architecture News, 2002 - dl.acm.org
This paper advocates the use of a monitor-and-recover programming paradigm to enhance
the reliability of software, and proposes an architectural design that allows software and …

Vulnerability discovery with attack injection

J Antunes, N Neves, M Correia… - IEEE Transactions …, 2010 - ieeexplore.ieee.org
The increasing reliance put on networked computer systems demands higher levels of
dependability. This is even more relevant as new threats and forms of attack are constantly …

多变体执行安全防御技术研究综述

姚东, 张铮, 张高斐, 刘浩, 潘传幸, 邬江兴 - 信息安全学报, 2020 - jcs.iie.ac.cn
软件和信息系统的高速发展在给人们生活带来诸多便利的同时, 也让更多的安全风险来到了我们
身边, 不法分子可以很方便的利用无处不在的网络和越来越自动化, 低门槛的攻击技术去获得 …

Venerable variadic vulnerabilities vanquished

P Biswas, A Di Federico, SA Carr… - 26th USENIX Security …, 2017 - usenix.org
Programming languages such as C and C++ support variadic functions, ie, functions that
accept a variable number of arguments (eg, printf). While variadic functions are flexible, they …

Large-scale analysis of format string vulnerabilities in debian linux

K Chen, D Wagner - Proceedings of the 2007 workshop on …, 2007 - dl.acm.org
Format-string bugs are a relatively common security vulnerability, and can lead to arbitrary
code execution. In collaboration with others, we designed and implemented a system to …