Proceedings of the 17th ACM Conference on Computer and Communications Security 2010
DOI: 10.1145/1866307.1866371
|View full text |Cite
|
Sign up to set email alerts
|

DieHarder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 158 publications
(30 citation statements)
references
References 16 publications
0
22
0
Order By: Relevance
“…One method used to secure the program heap is to add defenses within the memory allocator [31], which can be combined with other security mechanisms, such as non-executable segments and address space layout randomization (ASLR). However, existing allocators are either insecure or ine cient.…”
Section: Vulnerabilitiesmentioning
confidence: 99%
See 2 more Smart Citations
“…One method used to secure the program heap is to add defenses within the memory allocator [31], which can be combined with other security mechanisms, such as non-executable segments and address space layout randomization (ASLR). However, existing allocators are either insecure or ine cient.…”
Section: Vulnerabilitiesmentioning
confidence: 99%
“…One type belongs to bump-pointer or sequential allocators, which sequentially allocate di erent sizes of objects in a continuous range [31]. They maintain freelists for di erent size classes to assist fast allocations, and are also called freelist-based allocators.…”
Section: Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Other approaches, e.g., (Berger and Zorn 2006;Lvin et al 2008;Novark and Berger 2010;Novark et al 2009; Perence, B, Electric Fence, http://perens.com/ FreeSoftware/ElectricFence; Akritidis 2010; Serebryany et al 2012), have used custom memory managers tailored to improve the memory safety of applications using them. They detect or help mitigate heap corruptions, dangling pointers or reads of uninitialized data.…”
Section: Custom Memory Allocationmentioning
confidence: 99%
“…Electric Fence relies on the CPU page protection -for each heap buffer, it allocates an extra page that is marked as inaccessible. DieHarder (Novark and Berger 2010) (a descendant of DieHard (Berger and Zorn 2006)) finds memory bugs probabilistically. Specifically, its modified malloc function also adds redzones around memory regions returned to the user, but instead of marking them as inaccessible, it populates the newly allocated memory with special magic values.…”
Section: Custom Memory Allocationmentioning
confidence: 99%