For the current REF see the REF 2021 website REF 2021 logo

Output details

11 - Computer Science and Informatics

Imperial College London

Return to search Previous output Next output
Output 140 of 201 in the submission
Output title

Preventing Memory Error Exploits with WIT

Type
E - Conference contribution
Name of conference/published proceedings
IEEE Symposium on Security and Privacy (S&P'08)
Volume number
-
Issue number
-
First page of article
263
ISSN of proceedings
1081-6011
Year of publication
2008
URL
-
Number of additional authors
4
Additional information

<19>Introduces WIT, a novel technique that provides protection against security attacks that exploit memory errors, by first computing the set of objects that can be written by each instruction at compile-time, and then instrumenting the code to detect attacks that try to modify objects outside of this set. The key strengths of WIT are that it compiles C and C++ programs without modifications, has high coverage with no false positives, and a low performance overhead. IEEE S&P'08 acceptance rate: 11.2%/249. WIT was extended and adapted to work on binaries by the BinArmor project [Slowinska et al, USENIX ATC'12].

Interdisciplinary
-
Cross-referral requested
-
Research group
E - Programming Languages and Systems
Citation count
33
Proposed double-weighted
No
Double-weighted statement
-
Reserve for a double-weighted output
No
Non-English
No
English abstract
-