Articles with "memory corruption" as a keyword



Photo by kellysikkema from unsplash

When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3272833

Abstract: Concurrent programs are widespread in modern systems. They make better use of processor resources but inevitably introduce a new set of problems in terms of reliability and security. Concurrency bugs usually lead to program crashes… read more here.

Keywords: memory corruption; concurrency; concurrency vulnerabilities; concurrent programs ... See more keywords
Photo by saadahmad_umn from unsplash

Capturing Invalid Input Manipulations for Memory Corruption Diagnosis

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3145022

Abstract: Memory corruption diagnosis, especially at the binary level where all high-level program abstractions are missing, is a tedious and time-consuming task. Given a crash, memory corruption diagnosis is expected to not only locate the root… read more here.

Keywords: memory corruption; mml; tex math; inline formula ... See more keywords
Photo from wikipedia

Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3149371

Abstract: Memory corruption vulnerabilities remain a prevalent threat on low-cost bare-metal devices. Fuzzing is a popular technique for automatically discovering such vulnerabilities. However, bare-metal devices lack even basic security mechanisms such as Memory Management Unit. Consequently,… read more here.

Keywords: memory corruption; bare metal; identification; corruption vulnerabilities ... See more keywords