منابع مشابه
Synthesis of Uninitialized Systems
The sequential synthesis problem, which is closely related to Church’s solvability problem, asks, given a specification in the form of a binary relation between input and output streams, for the construction of a finite-state stream transducer that converts inputs to appropriate outputs. For efficiency reasons, practical sequential hardware is often designed to operate without prior initializat...
متن کاملAutomatic Detection of Uninitialized Variables
One of the most common programming errors is the use of a variable before its definition. This undefined value may produce incorrect results, memory violations, unpredictable behaviors and program failure. To detect this kind of error, two approaches can be used: compile-time analysis and run-time checking. However, compile-time analysis is far from perfect because of complicated data and contr...
متن کاملTrading uninitialized space for time
The design of efficient graph algorithms usually precludes the test of edge existence, because an efficient support of that operation already requires time (n2) for the initialization of an adjacency-matrix representation. We describe an alternative representation of static directed graphs taking (n+m) initialization time and using (n2) space, which supports the efficient implementation of all ...
متن کاملExploitations of Uninitialized Uses on macOS Sierra
An uninitialized use refers to a common coding mistake where programmers directly use variables on the stack or the heap before they are initialized. Uninitialized uses, although simple, can lead to severe security consequences. In this paper, we will share our experience in gaining arbitrary kernel code execution in the latest macOS Sierra by exploiting two uninitialized use vulnerabilities fo...
متن کاملLeaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract)
Intel Software Guard Extensions (SGX) aims to provide an isolated execution environment, known as an enclave, for a user-level process to maximize its confidentiality and integrity. In this paper, we study how uninitialized data inside a secure enclave can be leaked via structure padding. We found that, during ECALL and OCALL, proxy functions that are automatically generated by the Intel SGX So...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2016
ISSN: 1542-7730,1542-7749
DOI: 10.1145/3028687.3041020