A Study of the Evolution of Defences in Linux Software and Vulnerable Register Spilling
نویسندگان
چکیده
In this paper, we did a comprehensive survey on the evolution of defense in Linux softwares. Our survey mainly focused on Stack Canary, CFI and ASLR. In order to measure the coverage of Stack Canary, we collected more than 1 million package data. Besides, we also found that ASLR is an operating system behavior, and CFI was still not widely implemented in production compilers. Beyond the survey, we did a case study, evaluating the effectiveness of stack canary based on binary analysis.
منابع مشابه
Evolution of the female roles in the US (Case study: The Hollywood movies in the late 1970s and early 1980s)
Prior to the 1980s, numerous charges of discrimination were noteworthy among women in Hollywood. In those years, women were in uncertain situations, so they seemed aimless and vulnerable. In the period that this article focuses on, the female characters are or have become intelligent and therefore open-minded and potentially independent. Although, they are still vulnerable and unsure of themsel...
متن کاملMicronutrients in Support to The Carbon Cycle Activate Antioxidant Defences and Reduce Sperm DNA Damage in Infertile Men Attending Assisted Reproductive Technology Programs: Clinical Trial Study
Background: Micronutrients in support to the carbon cycle were shown to reduce sperm DNA damage both in animal models and infertile men. Besides supporting DNA methylation, their positive effect may be mediated by an improved performance of the endogenous antioxidant system but this has not yet been proven in clinical settings. The present study aimed at evaluating the effects of micronutrient ...
متن کاملÉtude des problèmes de spilling et coalescing liés à l'allocation de registres en tant que deux phases distinctes. (A Study of Spilling and Coalescing in Register Allocation as Two Separate Phases)
متن کامل
Register Spilling for Specific Application Domains in Application Specific Instruction-set Processors
An Application Specific Instruction set Processor (ASIP) is an important component in designing embedded systems. One of the problems in designing an instruction set for such processors is determining the number of registers is needed in the processor that will optimize the computational time and the cost. The performance of a processor may fall short due to register spilling, which is caused b...
متن کاملPeriodic register saturation in innermost loops
This article treats register constraints in high performance embedded VLIW computing, aiming to decouple register constraints from instruction scheduling. It extends the register saturation (RS) concept to periodic instruction schedules, i.e., software pipelining (SWP). We formally study an approach which consists in computing the exact upper-bound of the register need for all the valid SWP sch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016