Cornucopia: Temporal safety for CHERI heaps

NW Filardo, BF Gutstein, J Woodruff… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Use-after-free violations of temporal memory safety continue to plague software systems,
underpinning many high-impact exploits. The CHERI capability system shows great promise …

Cherivoke: Characterising pointer revocation using cheri capabilities for temporal memory safety

H **a, J Woodruff, S Ainsworth, NW Filardo… - Proceedings of the …, 2019 - dl.acm.org
A lack of temporal safety in low-level languages has led to an epidemic of use-after-free
exploits. These have surpassed in number and severity even the infamous buffer-overflow …

Cryptographic capability computing

M LeMay, J Rakshit, S Deutsch, DM Durham… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
Capability architectures for memory safety have traditionally required expanding pointers
and radically changing microarchitectural structures throughout processors, while only …

MarkUs: Drop-in use-after-free prevention for low-level languages

S Ainsworth, TM Jones - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
Use-after-free vulnerabilities have plagued software written in low-level languages, such as
C and C++, becoming one of the most frequent classes of exploited software bugs. Attackers …

Dangzero: Efficient use-after-free detection via direct page table access

F Gorter, K Koning, H Bos, C Giuffrida - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Use-after-free vulnerabilities remain difficult to detect and mitigate, making them a popular
source of exploitation. Existing solutions incur impractical performance/memory overhead …

{PTAuth}: Temporal memory safety via robust points-to authentication

RM Farkhani, M Ahmadi, L Lu - 30th USENIX Security Symposium …, 2021 - usenix.org
Temporal memory corruptions are commonly exploited software vulnerabilities that can lead
to powerful attacks. Despite significant progress made by decades of research on mitigation …

Preventing {Use-After-Free} Attacks with Fast Forward Allocation

B Wickman, H Hu, I Yun, D Jang, JW Lim… - 30th USENIX Security …, 2021 - usenix.org
Memory-unsafe languages are widely used to implement critical systems like kernels and
browsers, leading to thousands of memory safety issues every year. A use-after-free bug is a …

Position paper: Progressive memory safety for webassembly

C Disselkoen, J Renner, C Watt, T Garfinkel… - Proceedings of the 8th …, 2019 - dl.acm.org
WebAssembly (Wasm) is a low-level platform-independent bytecode language. Today,
developers can compile C/C++ to Wasm and run it everywhere, at almost native speeds …

Tightly Seal Your Sensitive Pointers with {PACTight}

M Ismail, A Quach, C Jelesnianski, Y Jang… - 31st USENIX Security …, 2022 - usenix.org
Tightly Seal Your Sensitive Pointers with PACTighT Page 1 This paper is included in the
Proceedings of the 31st USENIX Security Symposium. August 10–12, 2022 • Boston, MA, USA …

MineSweeper: a “clean sweep” for drop-in use-after-free prevention

M Erdős, S Ainsworth, TM Jones - Proceedings of the 27th ACM …, 2022 - dl.acm.org
Low-level languages, which require manual memory management from the programmer,
remain in wide use for performance-critical applications. Memory-safety bugs are common …