Sciweavers

50 search results - page 3 / 10
» DieHarder: securing the heap
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
SRDS
2003
IEEE
14 years 3 months ago
Transparent Runtime Randomization for Security
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes Transparent Runtime Randomization (TRR), a general...
Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
APLAS
2006
ACM
14 years 3 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...
OOPSLA
2005
Springer
14 years 3 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang
GLOBECOM
2008
IEEE
14 years 4 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair