2012 39th Annual International Symposium on Computer Architecture (ISCA) 2012
DOI: 10.1109/isca.2012.6237017
|View full text |Cite
|
Sign up to set email alerts
|

Watchdog: Hardware for safe and secure manual memory management and full memory safety

Abstract: Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable security vulnerabilities. This paper proposes Watchdog, a hardware-based approach for ensuring safe and secure manual memory management. Inspired by prior software-only proposals, Watchdog generates a unique identifier for each memory allocation, associates these identifiers with pointers, and checks to ensure that the identifier is still… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(50 citation statements)
references
References 31 publications
0
50
0
Order By: Relevance
“…The practical combination of Address Space Layout Randomization(ASLR), NX and stack protector is evaluated in Ubuntu 12.04 with appropriate OS/compiler switches(randomize va space = 2, -z noexecstack, -fstack-protector-all). [12], [24]- [26] are …”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The practical combination of Address Space Layout Randomization(ASLR), NX and stack protector is evaluated in Ubuntu 12.04 with appropriate OS/compiler switches(randomize va space = 2, -z noexecstack, -fstack-protector-all). [12], [24]- [26] are …”
Section: Resultsmentioning
confidence: 99%
“…Recently hardware based boundary checking solutions appear. [24] implements implicit boundary checking while [25], [26] implement explicit boundary checking. A pointer table of (address, base, size) is generated by compiler and maintained by hardware µops or extended instructions.…”
Section: Related Workmentioning
confidence: 99%
“…ManagedC is a software-based approach, thus we focus on research in this area rather than on hardwarebased research such as [6,10,26,27,32,35,36,41]. Like existing literature surveys [25], we distinguish between pointer-based approaches and object-based approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Memory bounds checking (MBC) annotate pointers with their legal address range and check every memory access against the base and bound of the associated data structure [3], [4], [50], [51]. However, the overhead of MBC is substantial.…”
Section: Comprehensive Defensesmentioning
confidence: 99%