Lava: Large-scale automated vulnerability addition
Work on automating vulnerability discovery has long been hampered by a shortage of
ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth …
ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth …
Sok: Eternal war in memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …
the oldest problems in computer security. The lack of safety in these languages allows …
Control-flow integrity principles, implementations, and applications
Current software attacks often build on exploits that subvert machine-code execution. The
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …
[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.
J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
EXE: Automatically generating inputs of death
This article presents EXE, an effective bug-finding tool that automatically generates inputs
that crash real code. Instead of running code on manually or randomly constructed input …
that crash real code. Instead of running code on manually or randomly constructed input …
{Under-Constrained} symbolic execution: Correctness checking for real code
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
SoftBound: Highly compatible and complete spatial memory safety for C
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …
Non-control-data attacks are realistic threats.
S Chen, J Xu, EC Sezer, P Gauriar… - USENIX security …, 2005 - usenix.org
Most memory corruption attacks and Internet worms follow a familiar pattern known as the
control-data attack. Hence, many defensive techniques are designed to protect program …
control-data attack. Hence, many defensive techniques are designed to protect program …
Secure program execution via dynamic information flow tracking
We present a simple architectural mechanism called dynamic information flow tracking that
can significantly improve the security of computing systems with negligible performance …
can significantly improve the security of computing systems with negligible performance …