Zobrazeno 1 - 10
of 216
pro vyhledávání: '"Function pointer"'
Publikováno v:
Procedia Computer Science. 166:78-83
For a long time, the embedded industry has been constrained by CPU performance, ROM and RAM capacity and other factors, so the software scale cannot be built too large. The new embedded designers often overturn the original version because they canno
Publikováno v:
CCS
Most modern software attacks are rooted in memory corruption vulnerabilities, which are capable of altering security-sensitive data (e.g., function pointers) to unintended values. This paper introduces a new security property, the Value Invariant Pro
Autor:
Miguel A. Arroyo, Evgeny Manzhosov, Simha Sethumadhavan, Vasileios P. Kemerlis, Mohamed Tarek Ibn Ziad
Publikováno v:
2021 International Symposium on Secure and Private Execution Environment Design (SEED).
Code-reuse attacks continue to pose a significant threat to systems security, from resource-constrained environments to data-centers. While current mitigation techniques excel at providing efficient protection for high-end devices, they typically suf
Publikováno v:
SP Workshops
Historically, attackers have sought to manipulate programs through the corruption of return addresses, function pointers, and other control flow data. However, as protections like ASLR, stack canaries, and no-execute bits have made such attacks more
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the ACM on Programming Languages. 2:1-22
New non-volatile memory (NVM) technologies enable direct, durable storage of data in an application's heap. Durable, randomly accessible memory facilitates the construction of applications that do not lose data at system shutdown or power failure. Ex
Publikováno v:
Programming Languages and Systems ISBN: 9783030890506
Verification of memory safety such as absence of null pointer dereferences and memory leaks in system software is important in practice. O’Hearn’s group proposed a new method of memory safety analysis/verification by modular abstract interpretati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::543319864ab91db7b181eb24a46cd7b1
https://doi.org/10.1007/978-3-030-89051-3_2
https://doi.org/10.1007/978-3-030-89051-3_2
Publikováno v:
ASPLOS
ASPLOS '19 Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems
ASPLOS 2019-The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems
ASPLOS 2019-The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Apr 2019, Providence, Rhode Island, United States. pp.287-299, ⟨10.1145/3297858.3304065⟩
ASPLOS '19 Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems
ASPLOS 2019-The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems
ASPLOS 2019-The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Apr 2019, Providence, Rhode Island, United States. pp.287-299, ⟨10.1145/3297858.3304065⟩
International audience; For waiting, the Linux kernel offers both sleep-able and non-sleep operations. However, only non-sleep operations can be used in atomic context. Detecting the possibility of execution in atomic context requires a complete inte
Publikováno v:
ACM Transactions on Computer Systems
ACM Transactions on Computer Systems, Association for Computing Machinery, 2020, 36 (4), pp.10. ⟨10.1145/3381990⟩
ACM Transactions on Computer Systems, 2020, 36 (4), pp.10. ⟨10.1145/3381990⟩
ACM Transactions on Computer Systems, Association for Computing Machinery, 2020, 36 (4), pp.10. ⟨10.1145/3381990⟩
ACM Transactions on Computer Systems, 2020, 36 (4), pp.10. ⟨10.1145/3381990⟩
Atomic context is an execution state of the Linux kernel in which kernel code monopolizes a CPU core. In this state, the Linux kernel may only perform operations that cannot sleep, as otherwise a system hang or crash may occur. We refer to this kind
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dac7023fc14f5937ea1848520a36b411
https://hal.inria.fr/hal-03032244
https://hal.inria.fr/hal-03032244
Autor:
Ma Chi
Publikováno v:
ICSCA
Debugging costs almost half of the development time of programmers. To understand what happened in the buggy execution, one has to backtrack on the execution history, examine suspicious behaviours one by one and finally locate the key symptom. Accele