Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3485376
|View full text |Cite
|
Sign up to set email alerts
|

VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 63 publications
0
3
0
Order By: Relevance
“…There are previous studies to enhance memory safety. VIP [26] protects heap metadata through a virtual address with Intel MPK and builds a defense against an attack that tampers the CFI or executes arbitrary code that leverages metadata corruption vulnerabilities and heap overflow. This protection methodology relied on the x86 architecture.…”
Section: B Memory Hardeningmentioning
confidence: 99%
See 1 more Smart Citation
“…There are previous studies to enhance memory safety. VIP [26] protects heap metadata through a virtual address with Intel MPK and builds a defense against an attack that tampers the CFI or executes arbitrary code that leverages metadata corruption vulnerabilities and heap overflow. This protection methodology relied on the x86 architecture.…”
Section: B Memory Hardeningmentioning
confidence: 99%
“…The metaSafer methodology represents a novel approach aimed at identifying instances of metadata corruption within the Wasm environment. Its primary objective differs from methodologies [26], [27], [28] utilized in other domains and environments(x86) or those reliant on hardware-based protection mechanisms. Since Wasm takes a memory access method through metadata in a unique structure called linear memory, this paper suggests the need for a new protection technique suitable for Wasm linear memory, rather than protection that reuses existing protection techniques.…”
Section: B Memory Hardeningmentioning
confidence: 99%
“…Some memory isolation schemes leverage PKU to isolate trusted from untrusted components [33,39,40,48,63]. These systems typically tag memory pages containing trusted code and data with a different protection key than pages containing untrusted code, thereby placing them in different memory protection domains.…”
Section: Pku-based Memory Isolation Schemesmentioning
confidence: 99%