Detection, exploitation and mitigation of memory errors

Logic Journal of the IGPL 32 (2):281-292 (2024)
  Copy   BIBTEX

Abstract

Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. In this paper, we summarise the main memory safety violation types (i.e. memory errors), and analyse how they are exploited by attackers and the main mitigation methods proposed in the research community. We further systematise the most relevant techniques with regards to memory corruption identification in current programs.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,227

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The nature of errors in experimental lie detection.D. Van Buskirk & F. L. Marcuse - 1954 - Journal of Experimental Psychology 47 (3):187.
Individual differences in the detection, matching and memory of faces.Matthew Fysh - 2018 - Cognitive Research: Principles and Implications 3 (20).
Confabulation and constructive memory.Sarah K. Robins - 2019 - Synthese 196 (6):2135-2151.
Misremembering.Sarah K. Robins - 2016 - Philosophical Psychology 29 (3):432-447.
The Ethics of Exploitation.Paul McLaughlin - 2008 - Studia Philosophica Estonica 1 (3):5-16.
On Fine's Resolution of the EPR-Bell Problem.László E. Szabó - 2000 - Foundations of Physics 30 (11):1891-1909.
Signal-detection theory and short-term memory.Bennet B. Murdock Jr - 1965 - Journal of Experimental Psychology 70 (5):443.
Vulnerability and Exploitation in a Globalized World.Agomoni Ganguli Mitra & Nikola Biller-Andorno - 2013 - International Journal of Feminist Approaches to Bioethics 6 (1):91-102.

Analytics

Added to PP
2024-03-17

Downloads
22 (#712,914)

6 months
22 (#124,404)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references