A Study of the Evolution of Defences in Linux Software and Vulnerable Register Spilling

نویسندگان

  • Kun Huang
  • Kun Luo
  • Yili Ding
  • Yansong Gao
  • Minxuan Zhou
چکیده

In this paper, we did a comprehensive survey on the evolution of defense in Linux softwares. Our survey mainly focused on Stack Canary, CFI and ASLR. In order to measure the coverage of Stack Canary, we collected more than 1 million package data. Besides, we also found that ASLR is an operating system behavior, and CFI was still not widely implemented in production compilers. Beyond the survey, we did a case study, evaluating the effectiveness of stack canary based on binary analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolution of the female roles in the US (Case study: The Hollywood movies in the late 1970s and early 1980s)

Prior to the 1980s, numerous charges of discrimination were noteworthy among women in Hollywood. In those years, women were in uncertain situations, so they seemed aimless and vulnerable. In the period that this article focuses on, the female characters are or have become intelligent and therefore open-minded and potentially independent. Although, they are still vulnerable and unsure of themsel...

متن کامل

Micronutrients in Support to The Carbon Cycle Activate Antioxidant Defences and Reduce Sperm DNA Damage in Infertile Men Attending Assisted Reproductive Technology Programs: Clinical Trial Study

Background: Micronutrients in support to the carbon cycle were shown to reduce sperm DNA damage both in animal models and infertile men. Besides supporting DNA methylation, their positive effect may be mediated by an improved performance of the endogenous antioxidant system but this has not yet been proven in clinical settings. The present study aimed at evaluating the effects of micronutrient ...

متن کامل

Register Spilling for Specific Application Domains in Application Specific Instruction-set Processors

An Application Specific Instruction set Processor (ASIP) is an important component in designing embedded systems. One of the problems in designing an instruction set for such processors is determining the number of registers is needed in the processor that will optimize the computational time and the cost. The performance of a processor may fall short due to register spilling, which is caused b...

متن کامل

Periodic register saturation in innermost loops

This article treats register constraints in high performance embedded VLIW computing, aiming to decouple register constraints from instruction scheduling. It extends the register saturation (RS) concept to periodic instruction schedules, i.e., software pipelining (SWP). We formally study an approach which consists in computing the exact upper-bound of the register need for all the valid SWP sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016