Dynpta: Combining static and dynamic analysis for practical selective data protection
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …
exploit mitigation technologies, the leakage of sensitive process data through the …
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against {Data-Oriented} Attacks
Data-oriented attacks are becoming increasingly realistic and effective against the state-of-
the-art defenses in most operating systems. These attacks manipulate memory-resident data …
the-art defenses in most operating systems. These attacks manipulate memory-resident data …
Revisiting browser security in the modern era: New data-only attacks and defenses
R Rogowski, M Morton, F Li, F Monrose… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
The continuous discovery of exploitable vulnerabilitiesin popular applications (eg, web
browsers and documentviewers), along with their heightening protections against control …
browsers and documentviewers), along with their heightening protections against control …
Mitigating data leakage by protecting memory-resident sensitive data
Gaining reliable arbitrary code execution through the exploitation of memory corruption
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …
Mitigating data-only attacks by protecting memory-resident sensitive data
Gaining reliable arbitrary code execution through the exploitation of memory corruption
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …
Quantitative Metrics and Measurement Methodologies for System Security Assurance
MS Ahmed - 2022 - vtechworks.lib.vt.edu
Proactive approaches for preventing attacks through security measurements are crucial for
preventing sophisticated attacks. However, proactive measures must employ qualitative …
preventing sophisticated attacks. However, proactive measures must employ qualitative …
[PDF][PDF] Poster: Automatic Identification and Protection of Memory-resident Sensitive Data to Defend Against Data-Oriented Attacks
Software and hardware-based countermeasures for protecting memory-resident data to
prevent data-oriented attacks suffer from high performance overhead due to a large number …
prevent data-oriented attacks suffer from high performance overhead due to a large number …
On the impact of memory corruption vulnerabilities in client applications
R Gawlik - 2016 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - On the impact of memory corruption vulnerabilities in client applications
Deutsch OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ OPUS …
Deutsch OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ OPUS …
[PDF][PDF] SYSTEMATIC METHODS FOR MEMORY ERROR DETECTION AND EXPLOITATION
HU HONG - 2016 - core.ac.uk
Memory errors are classical problems in computer system security. At a specific execution
time, one particular memory operation should only access a subset of the full memory space …
time, one particular memory operation should only access a subset of the full memory space …