Sok: Eternal war in memory

L Szekeres, M Payer, T Wei… - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …

Memory errors: The past, the present, and the future

V Van der Veen, N Dutt-Sharma, L Cavallaro… - Research in Attacks …, 2012 - Springer
Memory error exploitations have been around for over 25 years and still rank among the top
3 most dangerous software errors. Why haven't we been able to stop them? Given the host …

[PDF][PDF] Cross-Language Attacks.

S Mergendahl, N Burow, H Okhravi - NDSS, 2022 - ndss-symposium.org
Memory corruption attacks against unsafe programming languages like C/C++ have been a
major threat to computer systems for multiple decades. Various sanitizers and runtime …

Language-independent sandboxing of just-in-time compilation and self-modifying code

J Ansel, P Marchenko, U Erlingsson, E Taylor… - Proceedings of the …, 2011 - dl.acm.org
When dealing with dynamic, untrusted content, such as on the Web, software behavior must
be sandboxed, typically through use of a language like JavaScript. However, even for such …

Unleashing use-before-initialization vulnerabilities in the linux kernel using targeted stack spraying

K Lu, MT Walter, D Pfaff, S Nürnberger, W Lee… - 2017 - publications.cispa.de
A common type of memory error in the Linux kernel is using uninitialized variables
(uninitialized use). Uninitialized uses not only cause undefined behaviors but also impose a …

[PDF][PDF] Exploiting and Protecting Dynamic Code Generation.

C Song, C Zhang, T Wang, W Lee, D Melski - NDSS, 2015 - faculty.cc.gatech.edu
Many mechanisms have been proposed and deployed to prevent exploits against software
vulnerabilities. Among them, W⊕ X is one of the most effective and efficient. W⊕ X prevents …

JITDefender: A defense against JIT spraying attacks

P Chen, Y Fang, B Mao, L **e - Future Challenges in Security and Privacy …, 2011 - Springer
JIT spraying is a new code-reuse technique to attack virtual machines based on JIT (Just-in-
time) compilation. It has proven to be capable of circumventing the defenses such as data …

SoK: On the analysis of web browser security

J Lim, Y **, M Alharthi, X Zhang, J Jung… - arxiv preprint arxiv …, 2021 - arxiv.org
Web browsers are integral parts of everyone's daily life. They are commonly used for
security-critical and privacy sensitive tasks, like banking transactions and checking medical …

JITSafe: a framework against Just‐in‐time spraying attacks

P Chen, R Wu, B Mao - IET Information Security, 2013 - Wiley Online Library
A new code‐reuse attack, named Just‐in‐time (JIT) spraying attack, leverages the
predictable generated JIT compiled code to launch an attack. It can circumvent the defenses …

[PDF][PDF] Too LeJIT to Quit: Extending JIT Spraying to ARM.

W Lian, H Shacham, S Savage - NDSS, 2015 - cseweb.ucsd.edu
In the face of widespread DEP and ASLR deployment, JIT spraying brings together the best
of code injection and code reuse attacks to defeat both defenses. However, to date, JIT …