Memory Safety

Creator
Creator
Alan JoAlan Jo
Created
Created
2024 Mar 6 16:14
Editor
Editor
Alan JoAlan Jo
Edited
Edited
2024 Jun 20 17:14
Refs
Refs

Memory corruption is most (90%) of vulnerabilities

A computer program at a high level can be seen as a logical predicate describing all of its permitted behaviors. However, under memory corruption exploits, predicates could disappear, and the program merely becomes a Turing machine.

Attack Model

  • Difference steps exploiting memory chain
SoK: Eternal War in Memory. In IEEE S&P 2013.
SoK: Eternal War in Memory. In IEEE S&P 2013.
 
 
 
 
 
 
 

Recommendations