Authors
Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song
Publication date
2013/5/19
Conference
Security and Privacy (SP), 2013 IEEE Symposium on
Pages
48-62
Publisher
IEEE
Description
Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. The lack of safety in these languages allows attackers to alter the program's behavior or take full control over it by hijacking its control flow. This problem has existed for more than 30 years and a vast number of potential solutions have been proposed, yet memory corruption attacks continue to pose a serious threat. Real world exploits show that all currently deployed protections can be defeated. This paper sheds light on the primary reasons for this by describing attacks that succeed on today's systems. We systematize the current knowledge about various protection techniques by setting up a general model for memory corruption attacks. Using this model we show what policies can stop which attacks. The model identifies weaknesses of currently deployed techniques, as well as other …
Total citations
201320142015201620172018201920202021202220232024625707410211210011511811811375
Scholar articles
L Szekeres, M Payer, T Wei, D Song - 2013 IEEE Symposium on Security and Privacy, 2013