Zobrazeno 1 - 10
of 156
pro vyhledávání: '"Dangling pointer"'
Autor:
David J. Pearce
Publikováno v:
ACM Transactions on Programming Languages and Systems. 43:1-73
Rust is a relatively new programming language that has gained significant traction since its v1.0 release in 2015. Rust aims to be a systems language that competes with C/C++. A claimed advantage of Rust is a strong focus on memory safety without gar
Publikováno v:
IEEE Access, Vol 7, Pp 45961-45977 (2019)
Highly efficient languages, such as C/C++, have low-level control over memory. Due to the lack of validity detection for pointers and garbage collection for memory, developers are responsible for dynamic memory management by explicitly allocating and
Autor:
Brendan Dolan-Gavitt, Zekun Shen
Publikováno v:
ACSAC
Use-after-free (UAF) vulnerabilities, in which dangling pointers remain after memory is released, remain a persistent problem for applications written in C and C++. In order to protect legacy code, prior work has attempted to track pointer propagatio
Autor:
Alexander J. Summers
Publikováno v:
FTfJP@ECOOP
Producing reliable systems software is a major challenge, plagued by the ubiquitous problems of shared mutable state, pointer aliasing, dynamic memory management, and subtle concurrency issues such as race conditions; even expert programmers struggle
Autor:
Sergey Goncharov, Miriam Polzer
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030452308
FoSSaCS
FoSSaCS
Modelling and reasoning about dynamic memory allocation is one of the well-established strands of theoretical computer science, which is particularly well-known as a source of notorious challenges in semantics, reasoning, and proof theory. We capital
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c53d2a79ecaa811b8891e16454476cff
https://doi.org/10.1007/978-3-030-45231-5_28
https://doi.org/10.1007/978-3-030-45231-5_28
Autor:
Sam Ainsworth, Timothy M. Jones
Publikováno v:
IEEE Symposium on Security and Privacy
Use-after-free vulnerabilities have plagued software written in low-level languages, such as C and C++, becoming one of the most frequent classes of exploited software bugs. Attackers identify code paths where data is manually freed by the programmer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7c71236936ee3e94b30d6c2a4d39975e
Autor:
Toshihiro Yamauchi, Yuya Ban
Publikováno v:
CANDAR Workshops
Use-after-free (UAF) vulnerabilities, are abused by exploiting a dangling pointer that refers to a freed memory, location and then executing arbitrary code. Vulnerabilities are caused by bugs in software programs, particularly large scale programs su
Publikováno v:
IEICE Transactions on Information and Systems. (10):2295-2306
Recently, there has been an increase in use-after-free (UAF) vulnerabilities, which are exploited using a dangling pointer that refers to a freed memory. In particular, large-scale programs such as browsers often include many dangling pointers, and U
Autor:
Alexander Richardson, Robert N. M. Watson, Simon W. Moore, Peter Rugg, Peter G. Neumann, Hongyan Xia, Michael Roe, Jonathan Woodruff, Timothy M. Jones, Nathaniel Wesley Filardo, Sam Ainsworth
Publikováno v:
MICRO
A lack of temporal safety in low-level languages has led to an epidemic of use-after-free exploits. These have surpassed in number and severity even the infamous buffer-overflow exploits violating spatial safety. Capability addressing can directly en
Publikováno v:
LCTES
In this era of IoT devices, security is very often traded off for smaller device footprint and low power consumption. Considering the exponentially growing security threats of IoT and cyber-physical systems, it is important that these devices have bu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dbde66b9a1be405cfc301310b211748c