Control-flow integrity: Precision, security, and performance

N Burow, SA Carr, J Nash, P Larsen, M Franz… - ACM Computing …, 2017 - dl.acm.org
Memory corruption errors in C/C++ programs remain the most common source of security
vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption …

[PDF][PDF] Efficient, transparent, and comprehensive runtime code manipulation

D Bruening, S Amarasinghe - 2004 - burningcutlery.com
This thesis addresses the challenges of building a software system for general-purpose
runtime code manipulation. Modern applications, with dynamically-loaded modules and …

[PDF][PDF] Automatic vulnerability detection using static source code analysis

AI Sotirov - 2005 - Citeseer
4.1 Abstract Syntax Tree representation of C= A+ B.......... 22 4.2 Example of a C program
and its corresponding SSA form...... 23 4.3 The effect of constant propagation on a C …

Verifiable integrity guarantees for machine code programs

U Erlingsson, M Abadi, M Vrable - US Patent 8,104,021, 2012 - Google Patents
The subject matter of this application is related to that of US patent application Ser. No.
11/036,121, titled “Software Security Based On Control Flow Integrity” and of US patent …

Software security based on control flow integrity

M Abadi, MD Budiu, U Erlingsson, JA Ligatti - US Patent 7,577,992, 2009 - Google Patents
US7577992B2 - Software security based on control flow integrity - Google Patents
US7577992B2 - Software security based on control flow integrity - Google Patents Software …

Software memory access control

M Abadi, U Erlingsson, JA Ligatti, MD Budiu - US Patent 7,337,291, 2008 - Google Patents
Software memory access control is provided by associating instruction areas with memory
areas such that instruction areas are not permitted to access memory areas with which they …

Exploring Hardware Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

SD Mott - 2007 - scholar.afit.edu
This research explores how hardware-based primitives can be implemented to perform
security-related monitoring in real-time, offer better security, and increase performance …

Automated software attack recovery using rollback and huddle

J Sathre, J Zambreno - Design Automation for Embedded Systems, 2008 - Springer
While research into building robust and survivable networks has steadily intensified in
recent years, similar efforts at the application level and below have focused primarily on …

A hardware-based architecture to support flexible real-time parallel intrusion detection

S Mott, S Hart, D Montminy, P Williams… - … on System of …, 2007 - ieeexplore.ieee.org
Providing security in today's complex computing systems is a daunting task. As systems (of
systems) grow both increasingly pervasive and complex, defending them from attack or …

[KİTAP][B] Binary Recompilation Via Dynamic Analysis and the Protection of Control and Data-flows Therein

J Nash - 2020 - search.proquest.com
Legacy binaries need to continue functioning even when no source code has been
preserved, to support the workflows of government and industry. The binaries often lack …