Zum Hauptinhalt springen

Showing 1–2 of 2 results for author: Carr, S A

Searching in archive cs. Search in all archives.
.
  1. CUP: Comprehensive User-Space Protection for C/C++

    Authors: Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer

    Abstract: Memory corruption vulnerabilities in C/C++ applications enable attackers to execute code, change data, and leak information. Current memory sanitizers do no provide comprehensive coverage of a program's data. In particular, existing tools focus primarily on heap allocations with limited support for stack allocations and globals. Additionally, existing tools focus on the main executable with limite… ▽ More

    Submitted 17 April, 2017; originally announced April 2017.

  2. Control-Flow Integrity: Precision, Security, and Performance

    Authors: Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer

    Abstract: Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control flow. Researchers have spent more than a decade studying and refining defenses based on Control-Flow Integrity (CFI), and this technique is now int… ▽ More

    Submitted 27 January, 2017; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: Version submitted to ACM CSUR 01/27/17