Cornucopia: Temporal safety for CHERI heaps
NW Filardo, BF Gutstein, J Woodruff… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Use-after-free violations of temporal memory safety continue to plague software systems,
underpinning many high-impact exploits. The CHERI capability system shows great promise …
underpinning many high-impact exploits. The CHERI capability system shows great promise …
Cherivoke: Characterising pointer revocation using cheri capabilities for temporal memory safety
A lack of temporal safety in low-level languages has led to an epidemic of use-after-free
exploits. These have surpassed in number and severity even the infamous buffer-overflow …
exploits. These have surpassed in number and severity even the infamous buffer-overflow …
Cryptographic capability computing
Capability architectures for memory safety have traditionally required expanding pointers
and radically changing microarchitectural structures throughout processors, while only …
and radically changing microarchitectural structures throughout processors, while only …
MarkUs: Drop-in use-after-free prevention for low-level languages
Use-after-free vulnerabilities have plagued software written in low-level languages, such as
C and C++, becoming one of the most frequent classes of exploited software bugs. Attackers …
C and C++, becoming one of the most frequent classes of exploited software bugs. Attackers …
Dangzero: Efficient use-after-free detection via direct page table access
Use-after-free vulnerabilities remain difficult to detect and mitigate, making them a popular
source of exploitation. Existing solutions incur impractical performance/memory overhead …
source of exploitation. Existing solutions incur impractical performance/memory overhead …
{PTAuth}: Temporal memory safety via robust points-to authentication
Temporal memory corruptions are commonly exploited software vulnerabilities that can lead
to powerful attacks. Despite significant progress made by decades of research on mitigation …
to powerful attacks. Despite significant progress made by decades of research on mitigation …
Preventing {Use-After-Free} Attacks with Fast Forward Allocation
Memory-unsafe languages are widely used to implement critical systems like kernels and
browsers, leading to thousands of memory safety issues every year. A use-after-free bug is a …
browsers, leading to thousands of memory safety issues every year. A use-after-free bug is a …
Position paper: Progressive memory safety for webassembly
WebAssembly (Wasm) is a low-level platform-independent bytecode language. Today,
developers can compile C/C++ to Wasm and run it everywhere, at almost native speeds …
developers can compile C/C++ to Wasm and run it everywhere, at almost native speeds …
Tightly Seal Your Sensitive Pointers with {PACTight}
Tightly Seal Your Sensitive Pointers with PACTighT Page 1 This paper is included in the
Proceedings of the 31st USENIX Security Symposium. August 10–12, 2022 • Boston, MA, USA …
Proceedings of the 31st USENIX Security Symposium. August 10–12, 2022 • Boston, MA, USA …
MineSweeper: a “clean sweep” for drop-in use-after-free prevention
Low-level languages, which require manual memory management from the programmer,
remain in wide use for performance-critical applications. Memory-safety bugs are common …
remain in wide use for performance-critical applications. Memory-safety bugs are common …