Dynpta: Combining static and dynamic analysis for practical selective data protection

T Palit, JF Moon, F Monrose… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
As control flow hijacking attacks become more challenging due to the deployment of various
exploit mitigation technologies, the leakage of sensitive process data through the …

Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against {Data-Oriented} Attacks

S Ahmed, H Liljestrand, H Jamjoom, M Hicks… - 32nd USENIX Security …, 2023 - usenix.org
Data-oriented attacks are becoming increasingly realistic and effective against the state-of-
the-art defenses in most operating systems. These attacks manipulate memory-resident data …

Revisiting browser security in the modern era: New data-only attacks and defenses

R Rogowski, M Morton, F Li, F Monrose… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
The continuous discovery of exploitable vulnerabilitiesin popular applications (eg, web
browsers and documentviewers), along with their heightening protections against control …

Mitigating data leakage by protecting memory-resident sensitive data

T Palit, F Monrose, M Polychronakis - Proceedings of the 35th Annual …, 2019 - dl.acm.org
Gaining reliable arbitrary code execution through the exploitation of memory corruption
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …

Mitigating data-only attacks by protecting memory-resident sensitive data

T Palit, F Monrose, M Polychronakis - Digital Threats: Research and …, 2020 - dl.acm.org
Gaining reliable arbitrary code execution through the exploitation of memory corruption
vulnerabilities is becoming increasingly more difficult in the face of modern exploit …

Quantitative Metrics and Measurement Methodologies for System Security Assurance

MS Ahmed - 2022 - vtechworks.lib.vt.edu
Proactive approaches for preventing attacks through security measurements are crucial for
preventing sophisticated attacks. However, proactive measures must employ qualitative …

[PDF][PDF] Poster: Automatic Identification and Protection of Memory-resident Sensitive Data to Defend Against Data-Oriented Attacks

S Ahmed, H Liljestrand, N Asokan, DD Yao - ieee-security.org
Software and hardware-based countermeasures for protecting memory-resident data to
prevent data-oriented attacks suffer from high performance overhead due to a large number …

On the impact of memory corruption vulnerabilities in client applications

R Gawlik - 2016 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - On the impact of memory corruption vulnerabilities in client applications
Deutsch OPUS UB Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ OPUS …

[PDF][PDF] SYSTEMATIC METHODS FOR MEMORY ERROR DETECTION AND EXPLOITATION

HU HONG - 2016 - core.ac.uk
Memory errors are classical problems in computer system security. At a specific execution
time, one particular memory operation should only access a subset of the full memory space …