Sticky tags: Efficient and deterministic spatial memory error mitigation using persistent memory tags

F Gorter, T Kroes, H Bos… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in
C/C++ programs. Despite much research in the area, the performance overhead of (even …

DangZero: efficient use-after-free detection via direct page table access

F Gorter, K Koning, H Bos, C Giuffrida - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Use-after-free vulnerabilities remain difficult to detect and mitigate, making them a popular
source of exploitation. Existing solutions incur impractical performance/memory overhead …

Capacity: Cryptographically-enforced in-process capabilities for modern arm architectures

K Dinh Duy, K Cho, T Noh, H Lee - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In-process compartmentalization and access control have been actively explored to provide
in-place and efficient isolation of in-process security domains. Many works have proposed …

kMVX: Detecting kernel information leaks with multi-variant execution

S Österlund, K Koning, P Olivier, A Barbalace… - Proceedings of the …, 2019 - dl.acm.org
Kernel information leak vulnerabilities are a major security threat to production systems.
Attackers can exploit them to leak confidential information such as cryptographic keys or …

Uncontained: Uncovering container confusion in the linux kernel

J Koschel, P Borrello, DC D'Elia, H Bos… - 32nd USENIX Security …, 2023 - usenix.org
Type confusion bugs are a common source of security problems whenever software makes
use of type hierarchies, as an inadvertent downcast to an incompatible type is hard to detect …

Typro: Forward cfi for c-style indirect function calls using type propagation

M Bauer, I Grishchenko, C Rossow - Proceedings of the 38th Annual …, 2022 - dl.acm.org
Maliciously-overwritten function pointers in C programs often lead to arbitrary code
execution. In principle, forward CFI schemes mitigate this problem by restricting indirect …

Mitigating information leakage vulnerabilities with type-based data isolation

A Milburn, E Van Der Kouwe… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Information leakage vulnerabilities (or simply info leaks) such as out-of-bounds/uninitialized
reads in the architectural or speculative domain pose a significant security threat, allowing …

Top of the heap: Efficient memory error protection of safe heap objects

K Huang, M Payer, Z Qian, J Sampson, G Tan… - Proceedings of the …, 2024 - dl.acm.org
Heap memory errors remain a major source of software vulnerabilities. Existing memory
safety defenses aim at protecting all objects, resulting in high performance cost and …

Automated use-after-free detection and exploit mitigation: How far have we gone?

B Gui, W Song, H **ong, J Huang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
C/C++ programs frequently encounter memory errors, such as Use-After-Free (UAF), buffer
overflow, and integer overflow. Among these memory errors, UAF vulnerabilities are …

xTag: Mitigating use-after-free vulnerabilities via software-based pointer tagging on Intel X86-64

L Bernhard, M Rodler, T Holz… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
Memory safety in complex applications implemented in unsafe programming languages
such as C/C++ is still an unresolved problem in practice. Such applications were often …