Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Volckaert, Stijn"'
Memory Protection Keys for Userspace (PKU) is a recent hardware feature that allows programs to assign virtual memory pages to protection domains, and to change domain access permissions using inexpensive, unprivileged instructions. Several in-proces
Externí odkaz:
http://arxiv.org/abs/2110.04788
Multi-variant execution (MVX) systems amplify the effectiveness of software diversity techniques. The key idea is to run multiple diversified program variants in lockstep while providing them with the same input and monitoring their run-time behavior
Externí odkaz:
http://arxiv.org/abs/2011.02091
Autor:
Voulimeneas, Alexios, Song, Dokyung, Parzefall, Fabian, Na, Yeoul, Larsen, Per, Franz, Michael, Volckaert, Stijn
N-Variant Execution (NVX) systems utilize software diversity techniques for enhancing software security. The general idea is to run multiple different variants of the same program alongside each other while monitoring their run-time behavior. If the
Externí odkaz:
http://arxiv.org/abs/1903.03643
Autor:
Song, Dokyung, Lettner, Julian, Rajasekaran, Prabhu, Na, Yeoul, Volckaert, Stijn, Larsen, Per, Franz, Michael
The C and C++ programming languages are notoriously insecure yet remain indispensable. Developers therefore resort to a multi-pronged approach to find security issues before adversaries. These include manual, static, and dynamic program analysis. Dyn
Externí odkaz:
http://arxiv.org/abs/1806.04355
Sanitizers can detect security vulnerabilities in C/C++ code that elude static analysis. Current practice is to continuously fuzz and sanitize internal pre-release builds. Sanitization-enabled builds are rarely released publicly. This is in large par
Externí odkaz:
http://arxiv.org/abs/1711.08108
Multi-Variant Execution Environments (MVEEs) are a promising technique to protect software against memory corruption attacks. They transparently execute multiple, diversified variants (often referred to as replicae) of the software receiving the same
Externí odkaz:
http://arxiv.org/abs/1607.07841
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
© Mohaned Qunaibit, Stefan Brunthaler, Yeoul Na, Stijn Volckaert, and Michael Franz. Scientific applications are ideal candidates for the “heterogeneous computing” paradigm, in which parts of a computation are “offloaded” to available accele
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c9ee0ed496109c04033265b421021365
https://lirias.kuleuven.be/handle/123456789/664575
https://lirias.kuleuven.be/handle/123456789/664575
Autor:
Volckaert, Stijn, Coppens, Bart, Voulimeneas, Alexios, Homescu, Andrei, Larsen, Per, De Sutter, Bjorn, Franz, Michael
Publikováno v:
PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE
Memory corruption vulnerabilities remain a grave threat to systems software written in C/C++. Current best practices dictate compiling programs with exploit mitigations such as stack canaries, address space layout randomization, and control-flow inte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______330::1872246cfdab25bdf6a1af2bb79656f1
https://biblio.ugent.be/publication/8501998/file/8502023
https://biblio.ugent.be/publication/8501998/file/8502023