2008
DOI: 10.1109/sp.2008.30
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Memory Error Exploits with WIT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
191
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 224 publications
(192 citation statements)
references
References 15 publications
0
191
0
1
Order By: Relevance
“…On the other hand, experience has shown that low overhead mechanisms that trade off security guarantees for performance (e.g., approximate [48] or partial [5] memory safety) eventually get bypassed [9,52,21,11,17].…”
Section: Possible Countermeasuresmentioning
confidence: 99%
“…On the other hand, experience has shown that low overhead mechanisms that trade off security guarantees for performance (e.g., approximate [48] or partial [5] memory safety) eventually get bypassed [9,52,21,11,17].…”
Section: Possible Countermeasuresmentioning
confidence: 99%
“…WIT [2] discusses a very efficient technique to check whether instructions write to valid memory location. Their technique is based on static analysis that does a points-to analysis of the application.…”
Section: Runtime Enforcement Of Static Analysis Resultsmentioning
confidence: 99%
“…The simplest way to achieve this is to intercept signals such as a segmentation fault that indicates improper memory handling. Other approaches that detect memory errors can also be employed [18,8,1,21]. When an error is detected AS-SURE initiates offline rescue point analysis (see Fig.…”
Section: Rescue Point Discoverymentioning
confidence: 99%
“…To alleviate some of the dangers that bugs like buffer overflows and dangling pointers entail, various containment and runtime protection techniques have been proposed [8,1,7,12,18]. These techniques can offer assurances that certain types of program vulnerabilities cannot be exploited to compromise security, but they do not also offer high availability and reliability, as they frequently terminate the compromised program to prevent the attacker from performing any useful action.…”
Section: Introductionmentioning
confidence: 99%