Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243826
|View full text |Cite
|
Sign up to set email alerts
|

A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(36 citation statements)
references
References 39 publications
0
36
0
Order By: Relevance
“…We first look at the overheads of MarkUs in terms of memory and performance, contrasting them with other state-of-the-art use-after-free protections [4], [6], [7], [23]. We then take an indepth look at how we can trade off overheads within MarkUs, and the improvements rendered by the optimisations described in section III.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…We first look at the overheads of MarkUs in terms of memory and performance, contrasting them with other state-of-the-art use-after-free protections [4], [6], [7], [23]. We then take an indepth look at how we can trade off overheads within MarkUs, and the improvements rendered by the optimisations described in section III.…”
Section: Discussionmentioning
confidence: 99%
“…By comparison, while MarkUs is allowed to use the resources of other CPUs, the additional utilisation is typically negligible. In addition, MarkUs also compares favorably in terms of memory and performance against the higher-overhead techniques presented in the paper [23].…”
Section: Methodsmentioning
confidence: 95%
See 2 more Smart Citations
“…PSweeper [30] achieves concurrent pointer sweeping and object origin tracking to find dangling pointers, which improves the efficiency by sweeping all pointers in a concurrent thread. When a dangling pointer is dereferenced, developers can find the information of the use-after-free behavior by the help of object origin tracking, including where the dangling pointer is dereferenced, and how the object is allocated and freed.…”
Section: B Dangling Pointer Invalidationmentioning
confidence: 99%