[llvm-commits] CVS: llvm-www/safecode/menagerie/attacks.html index.html memsafety.html other.html

John Criswell criswell at cs.uiuc.edu
Thu Jun 17 07:16:16 PDT 2010



Changes in directory llvm-www/safecode/menagerie:

attacks.html updated: 1.2 -> 1.3
index.html updated: 1.2 -> 1.3
memsafety.html updated: 1.3 -> 1.4
other.html updated: 1.2 -> 1.3
---
Log message:

Added more papers.


---
Diffs of the changes:  (+93 -78)

 attacks.html   |   54 +++++++++++++++++++++++-------------------------------
 index.html     |   23 +----------------------
 memsafety.html |   45 +++++++++++++++++++++++++++++++++++++++++++--
 other.html     |   49 ++++++++++++++++++++++++++-----------------------
 4 files changed, 93 insertions(+), 78 deletions(-)


Index: llvm-www/safecode/menagerie/attacks.html
diff -u llvm-www/safecode/menagerie/attacks.html:1.2 llvm-www/safecode/menagerie/attacks.html:1.3
--- llvm-www/safecode/menagerie/attacks.html:1.2	Thu Jun 10 17:32:32 2010
+++ llvm-www/safecode/menagerie/attacks.html	Thu Jun 17 09:15:41 2010
@@ -1,3 +1,4 @@
+<meta name="Description" content="Information architecture, Web Design, Web Standards." />
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
 
 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
@@ -59,61 +60,52 @@
 			<h1>Introduction</h1>
 
       <p>
-      Understand attacks that exploit the lack of memory safety in programs is
+      <b>Know thy enemy.</b>
+      </p>
+
+      <p>
+      Understanding attacks that exploit the lack of memory safety in programs
+      is
       vital to understanding the different types of memory safety as well as
       the tradeoffs between enforcing one kind of memory safety over another.
-      Not all memory safety techniques are equally safe.
+      Not all memory safety techniques are created equal.
       </p>
 
       <p>
-      Below are papers that describe how attacks exploit memory safety errors
-      for fun and profit.  They're good to read; just don't make a career out
-      of using them.
+      Below are papers that describe how attacks exploit memory safety errors.
+      They're good to read; just make sure you use them for research and not
+      for fun and profit.
       </p>
 
 			<a name="Papers"></a>
 			<h1>Memory Safety Exploit Papers</h1>
 
 				<ul>
-        <li><a href="http://llvm.org/pubs/2009-08-12-UsenixSecurity-SafeSVAOS.html">
+        <li>
+        <a href="https://db.usenix.org/events/sec05/tech/full_papers/chen/chen.pdf">
         <b>
-        Memory Safety for Low-Level Software/Hardware Interactions
+        Non-Control-Data Attacks Are Realistic Threats
         </b></a>
         <br>
-        John Criswell, Nicolas Geoffray, and Vikram Adve
+        Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and
+        Ravishankar K. Iyer
         <br>
-        <i>Proceedings of the Eighteenth USENIX Security Symposium</i>,
-        Montreal, Canada, August 2009.
+        <i>Proceedings of the Fourteenth USENIX Security Symposium</i>,
+        Baltimore, MD, August 2005.
         </li>
 
         <br>
 
-        <li><a href="http://llvm.org/pubs/2007-SOSP-SVA.html">
+        <li>
+        <a href="http://whitepapers.zdnet.com/abstract.aspx?docid=1296547">
         <b>
-        Secure Virtual Architecture: A Safe Execution Environment for Commodity
-        Operating Systems</b></a>
+        Dangling Pointer: Smashing the Pointer for Fun and Profit</b></a>
         <br>
-        John Criswell, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve
+        Jonathan Afek and Adi Sharabani
         <br>
-        <i>Proceedings of the Twenty First ACM Symposium on Operating Systems
-        Principles (SOSP '07)</i>, Stevenson, WA, October 2007.
+        Whitepaper, 2007.
         <br>
-        <b> <font color="#FF00FF">
-        Received an SOSP 2007 Audience Choice Award.
-        </font></b>
         </li>
-
-        <br>
-
-        <li>
-        <a href="http://llvm.org/pubs/2006-06-18-WIOSCA-LLVAOS.html">
-        <b>
-        A Virtual Instruction Set
-        Interface for Operating System Kernels</b></a>
-        <br>
-        John Criswell, Brent Monroe, and Vikram Adve.<br><i>
-        Workshop on the Interaction between Operating Systems and Computer
-        Architecture (WIOSCA '06)</i>, Boston, Massachusetts, 2006.<br></li>
         </ul>
         </li>
 		</div>


Index: llvm-www/safecode/menagerie/index.html
diff -u llvm-www/safecode/menagerie/index.html:1.2 llvm-www/safecode/menagerie/index.html:1.3
--- llvm-www/safecode/menagerie/index.html:1.2	Thu Jun 10 17:32:32 2010
+++ llvm-www/safecode/menagerie/index.html	Thu Jun 17 09:15:41 2010
@@ -82,30 +82,9 @@
 
       <ul>
         <li>
-        June 10, 2010:
-        New Paper by WhatsHisName was published in AGoodConference
+        June 9, 2010: Started creation of the menagerie.
         </li>
       </ul>
-<!--
-        <p>
-        The motivation for the menagerie was the lack of communication I
-        observed between reseachers on memory safety.  Memory safety underlies
-        security for C programs as well as soundness of compiler analyses.  It
-        therefore tends to be studied by the security community (which
-        publishes in both security and operating system related conferences) as
-        well as the compiler and programming language communities (which
-        publishes in compiler and programming language conferences).  The sheer
-        number of communities and conferences make memory safety research hard
-        to follow, so it's no wonder that researchers often do not either know
-        about the work of their peers or misunderstand it.
-        </p>
-
-        <p>
-        This web site aims to be a one-stop shop for memory safety research and
-        to provide an adequeate (overwhelming?) review of the literature to
-        budding memory-safety researchers.
-        </p>
--->
 		</div>
 
     <!--#include virtual="sidebar.incl" -->


Index: llvm-www/safecode/menagerie/memsafety.html
diff -u llvm-www/safecode/menagerie/memsafety.html:1.3 llvm-www/safecode/menagerie/memsafety.html:1.4
--- llvm-www/safecode/menagerie/memsafety.html:1.3	Thu Jun 10 23:32:43 2010
+++ llvm-www/safecode/menagerie/memsafety.html	Thu Jun 17 09:15:41 2010
@@ -99,7 +99,6 @@
 
         <br>
 
-
         <li>
         <a href="http://www.cis.upenn.edu/acg/papers/pldi09_softbound.pdf">
         <b>
@@ -114,6 +113,20 @@
 
         <br>
 
+        <li>
+        <a href="https://db.usenix.org/events/osdi06/tech/full_papers/castro/castro.pdf">
+        <b>
+        Securing Software by Enforcing Data-Flow Integrity
+        </b></a>
+        <br>
+        Miguel Castro, Manuel Costa, and Tim Harris
+        <br>
+        Seventh USENIX Symposium on Operating Systems Design and
+        Implementation, November 2006.
+        </li>
+
+        <br>
+
         <li><a href="http://llvm.org/pubs/2006-DSN-DanglingPointers.html">
         <b>
         Efficiently Detecting All Dangling Pointer Uses in Production Servers
@@ -121,7 +134,8 @@
         <br>
         Dinakar Dhurjati and Vikram Adve.
         <br>
-        International Conference on Dependable Systems and Networks (DSN), 2006
+        International Conference on Dependable Systems and Networks (DSN), June
+        2006
         </li>
 
         <br>
@@ -191,6 +205,19 @@
         <br>
 
         <li>
+        <a href="http://www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Ruwase.pdf"><b>
+        A Practical Dynamic Buffer Overflow Detector
+        </b></a>
+        <br>
+        Olatunji Ruwase and Monica S. Lam.
+        <br>
+         Proceedings of the Network and Distributed System Security (NDSS)
+        Symposium, February 2004.
+        </li>
+
+        <br>
+
+<li>
         <a href="http://llvm.org/pubs/2003-05-05-LCTES03-CodeSafety.html"><b>
         Memory Safety without Runtime Checks or Garbage Collection for Embedded
         Systems
@@ -214,6 +241,20 @@
         Internaltional Conference on Compilers, Architecture and Synthesis for
         Embedded Systems (CASES), October 2002.
         </li>
+
+        <br>
+
+        <li>
+        <a href="http://hpc.doc.ic.ac.uk/~phjk/Publications/BoundsCheckingForC.ps.gz"><b>
+        Backwards-Compatible Bounds Checking for Arrays and Pointers in C
+        Programs
+        </b></a>
+        <br>
+        Richard W. M. Jones and Paul H. J. Kelly.
+        <br>
+        Third International Workshop on Automated Debugging, May 1997.
+        </li>
+
 		</div>
 
     <!--#include virtual="sidebar.incl" -->


Index: llvm-www/safecode/menagerie/other.html
diff -u llvm-www/safecode/menagerie/other.html:1.2 llvm-www/safecode/menagerie/other.html:1.3
--- llvm-www/safecode/menagerie/other.html:1.2	Thu Jun 10 17:32:32 2010
+++ llvm-www/safecode/menagerie/other.html	Thu Jun 17 09:15:41 2010
@@ -63,8 +63,8 @@
       semantic behavior, it is not the only approach to thwarting such attacks.
       Information flow, randomization, and canaries have also been used to
       detect attacks against undefined C program behavior.  A researcher in
-      memory safety should also be aware of these techniques and understand why
-      memory safety is a more comprehensive technique.
+      memory safety should also be aware of these techniques and understand the
+      tradeoffs between full memory safety and these other techniques.
       </p>
 
       <p>
@@ -76,40 +76,43 @@
 			<h1>Information Flow Papers</h1>
 
 				<ul>
-        <li><a href="http://llvm.org/pubs/2009-08-12-UsenixSecurity-SafeSVAOS.html">
+        </ul>
+
+			<a name="random"></a>
+			<h1>Randomization Papers</h1>
+
+			<a name="adhoc"></a>
+			<h1>Miscellaneous Papers</h1>
+
+      <ul>
+        <li><a href="http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND10.pdf">
         <b>
-        Memory Safety for Low-Level Software/Hardware Interactions
+        HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor
+        Control-Flow Integrity
         </b></a>
         <br>
-        John Criswell, Nicolas Geoffray, and Vikram Adve
+        Zhi Wang and Xuxian Jiang.
+        <br>
+        <i>Proceedings of the Thirty First IEEE Symposium on Security and
+           Privacy</i>,
+        Oakland, CA, May 2010.
         <br>
-        <i>Proceedings of the Eighteenth USENIX Security Symposium</i>,
-        Montreal, Canada, August 2009.
         </li>
 
         <br>
 
-        <li><a href="http://llvm.org/pubs/2007-SOSP-SVA.html">
+        <li><a href="http://portal.acm.org/citation.cfm?id=1755913.1755934">
         <b>
-        Secure Virtual Architecture: A Safe Execution Environment for Commodity
-        Operating Systems</b></a>
+        Defeating return-oriented rootkits with "Return-Less" kernels
+        </b></a>
         <br>
-        John Criswell, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve
+        Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram.
         <br>
-        <i>Proceedings of the Twenty First ACM Symposium on Operating Systems
-        Principles (SOSP '07)</i>, Stevenson, WA, October 2007.
+        <i>Proceedings of the Fifth European conference on Computer systems</i>,
+        Paris, France, April 2010.
         <br>
-        <b> <font color="#FF00FF">
-        Received an SOSP 2007 Audience Choice Award.
-        </font></b>
         </li>
-        </ul>
-
-			<a name="random"></a>
-			<h1>Randomization Papers</h1>
-
-			<a name="adhoc"></a>
-			<h1>Ad Hoc Technique Papers</h1>
+      </ul>
 		</div>
 
     <!--#include virtual="sidebar.incl" -->






More information about the llvm-commits mailing list