Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23096
|View full text |Cite
|
Sign up to set email alerts
|

MARX: Uncovering Class Hierarchies in C++ Programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 17 publications
(42 citation statements)
references
References 14 publications
0
42
0
Order By: Relevance
“…A better way would be to improve the static analysis to only keep functions in the vtable that are actually used. For this to work correctly, our approach has to track the data flow of vtables precisely to identify all used functions and must be able to modify entries in the vtables to remove unused ones [29].…”
Section: Discussionmentioning
confidence: 99%
“…A better way would be to improve the static analysis to only keep functions in the vtable that are actually used. For this to work correctly, our approach has to track the data flow of vtables precisely to identify all used functions and must be able to modify entries in the vtables to remove unused ones [29].…”
Section: Discussionmentioning
confidence: 99%
“…Eventually, the identified vtables are also used to identify and verify vcalls in the Virtual Callsite Identification phase. While the Vtable Identification static analysis is an improved and more exact version of Pawlowski et al [34] (finding vtables in .bss and GOT, considering indirect referencing of vtables), the other analyses are novel to . In the remainder of this section, we explain the details of our analysis approach.…”
Section: Analysis Approachmentioning
confidence: 99%
“…Compared to state-of-the-art binary-level analysis frameworks like Marx [34], our analysis identifies 26.5% more virtual callsites in SPEC CPU2017 and thus offers improved protection. induces geomean performance overhead of 9% for all C++ applications in SPEC CPU2017 and 11% for SPEC CPU2006, which is slightly more than Marx induces but with significantly better protection.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…Like Type-After-Type, Cling [2] offers type-safe memory reuse, but with important differences. First, it does not at all support the stack, leaving software vulnerable to widespread temporal stack vulnerabilities (and this is also the case for more recent variants focusing only on heap C++ objects [35]). Second, it is more limited in the detection of types and wrappers.…”
Section: Related Workmentioning
confidence: 99%