A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Light-weight bounds checking
2012
Proceedings of the Tenth International Symposium on Code Generation and Optimization - CHO '12
Memory errors in C and C++ programs continue to be one of the dominant sources of security problems, accounting for over a third of the high severity vulnerabilities reported in 2011. Wide-spread deployment of defenses such as addressspace layout randomization (ASLR) have made memory exploit development more difficult, but recent trends indicate that attacks are evolving to overcome this defense. Techniques for systematic detection and blocking of memory errors can provide more comprehensive
doi:10.1145/2259016.2259034
dblp:conf/cgo/HasabnisMS12
fatcat:kifvp4httbhufatinfkqdbjy3i