Buffer overflow and format string overflow vulnerabilities
KS Lhee, SJ Chapin - Software: practice and experience, 2003 - Wiley Online Library
Buffer overflow vulnerabilities are among the most widespread of security problems.
Numerous incidents of buffer overflow attacks have been reported and many solutions have …
Numerous incidents of buffer overflow attacks have been reported and many solutions have …
Sok: Eternal war in memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …
the oldest problems in computer security. The lack of safety in these languages allows …
Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks
Despite decades of sustained effort, memory corruption attacks continue to be one of the
most serious security threats faced today. They are highly sought after by attackers, as they …
most serious security threats faced today. They are highly sought after by attackers, as they …
[PDF][PDF] Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software.
J Newsome, DX Song - NDSS, 2005 - Citeseer
Software vulnerabilities have had a devastating effect on the Internet. Worms such as
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or …
{Under-Constrained} symbolic execution: Correctness checking for real code
Software bugs are a well-known source of security vulnerabilities. One technique for finding
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
bugs, symbolic execution, considers all possible inputs to a program but suffers from …
SoftBound: Highly compatible and complete spatial memory safety for C
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
CETS: compiler enforced temporal safety for C
Temporal memory safety errors, such as dangling pointer dereferences and double frees,
are a prevalent source of software bugs in unmanaged languages such as C. Existing …
are a prevalent source of software bugs in unmanaged languages such as C. Existing …
SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …
Secure program execution via dynamic information flow tracking
We present a simple architectural mechanism called dynamic information flow tracking that
can significantly improve the security of computing systems with negligible performance …
can significantly improve the security of computing systems with negligible performance …
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …