Memory Safety

Creator
Creator
Seonglae ChoSeonglae Cho
Created
Created
2024 Mar 6 16:14
Editor
Edited
Edited
2024 Sep 27 22:2
Refs
Refs

Memory corruption is most (90%) of vulnerabilities

A computer program at a high level can be seen as a logical predicate describing all of its permitted behaviors. However, under memory corruption exploits, predicates could disappear, and the program merely becomes a Turing machine.

Attack Model

  • Difference steps exploiting memory chain
SoK: Eternal War in Memory. In IEEE S&P 2013.
SoK: Eternal War in Memory. In IEEE S&P 2013.
 
 
 

Translating all c to Rust

 

Recommendations