Handbook of Information and Communication Security 2010
DOI: 10.1007/978-3-642-04117-4_30
|View full text |Cite
|
Sign up to set email alerts
|

Low-Level Software Security by Example

Abstract: Abstract. Computers are often subject to external attacks that aim to control software behavior. Typically, such attacks arrive as data over a regular communication channel and, once resident in program memory, trigger pre-existing, low-level software vulnerabilities. By exploiting such flaws, these low-level attacks can subvert the execution of the software and gain control over its behavior. The combined effects of these attacks make them one of the most pressing challenges in computer security. As a result,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 27 publications
(27 citation statements)
references
References 18 publications
0
27
0
Order By: Relevance
“…This is well-known and many papers give examples; we refer the reader to Erlingsson et al [14] for an overview. Here is one simple example of a program in C for which the principle of source-based reasoning fails.…”
Section: The Interactive Attacker Modelmentioning
confidence: 90%
See 2 more Smart Citations
“…This is well-known and many papers give examples; we refer the reader to Erlingsson et al [14] for an overview. Here is one simple example of a program in C for which the principle of source-based reasoning fails.…”
Section: The Interactive Attacker Modelmentioning
confidence: 90%
“…A wide variety of techniques has been developed to execute unsafe languages more defensively [14,34,35]. Roughly speaking, these techniques can be grouped into two categories.…”
Section: More Defensive Execution Of Unsafe Languagesmentioning
confidence: 99%
See 1 more Smart Citation
“…We mention the more advanced techniques because some of these can be used to circumvent some countermeasures. A more thorough technical examination of the vulnerabilities and exploitation techniques (as well as a technical examination of some countermeasures) can be found in [Younan 2003;2008;Erlingsson et al 2010]. …”
Section: Implementation Vulnerabilities and Exploitation Techniquesmentioning
confidence: 99%
“…In this section we will briefly discuss the most important types of countermeasures. A more extensive discussion can be found in [38,13,37]. [18,32,4,16,20,25,27] is a better solution to buffer overflows, however when implemented for C, it has a severe impact on performance and may cause existing code to become incompatible with bounds checked code.…”
Section: Related Workmentioning
confidence: 99%