{Defects-in-Depth}: Analyzing the Integration of Effective Defenses against {One-Day} Exploits in Android Kernels

L Maar, F Draschbacher, L Lamster… - 33rd USENIX Security …, 2024 - usenix.org
With the mobile phone market exceeding one billion units sold in 2023, ensuring the security
of these devices is critical. However, recent research has revealed worrying delays in the …

K-leak: Towards automating the generation of multi-step infoleak exploits against the linux kernel

Z Liang, X Zou, C Song, Z Qian - NDSS, 2024 - par.nsf.gov
The severity of information leak (infoleak for short) in OS kernels cannot be underestimated,
and various exploitation techniques have been proposed to achieve infoleak in OS kernels …

Top of the heap: Efficient memory error protection of safe heap objects

K Huang, M Payer, Z Qian, J Sampson, G Tan… - Proceedings of the …, 2024 - dl.acm.org
Heap memory errors remain a major source of software vulnerabilities. Existing memory
safety defenses aim at protecting all objects, resulting in high performance cost and …