[llvm-commits] CVS: llvm-www/safecode/menagerie/attacks.html index.html memsafety.html other.html
John Criswell
criswell at cs.uiuc.edu
Thu Jun 17 07:16:16 PDT 2010
Changes in directory llvm-www/safecode/menagerie:
attacks.html updated: 1.2 -> 1.3
index.html updated: 1.2 -> 1.3
memsafety.html updated: 1.3 -> 1.4
other.html updated: 1.2 -> 1.3
---
Log message:
Added more papers.
---
Diffs of the changes: (+93 -78)
attacks.html | 54 +++++++++++++++++++++++-------------------------------
index.html | 23 +----------------------
memsafety.html | 45 +++++++++++++++++++++++++++++++++++++++++++--
other.html | 49 ++++++++++++++++++++++++++-----------------------
4 files changed, 93 insertions(+), 78 deletions(-)
Index: llvm-www/safecode/menagerie/attacks.html
diff -u llvm-www/safecode/menagerie/attacks.html:1.2 llvm-www/safecode/menagerie/attacks.html:1.3
--- llvm-www/safecode/menagerie/attacks.html:1.2 Thu Jun 10 17:32:32 2010
+++ llvm-www/safecode/menagerie/attacks.html Thu Jun 17 09:15:41 2010
@@ -1,3 +1,4 @@
+<meta name="Description" content="Information architecture, Web Design, Web Standards." />
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
@@ -59,61 +60,52 @@
<h1>Introduction</h1>
<p>
- Understand attacks that exploit the lack of memory safety in programs is
+ <b>Know thy enemy.</b>
+ </p>
+
+ <p>
+ Understanding attacks that exploit the lack of memory safety in programs
+ is
vital to understanding the different types of memory safety as well as
the tradeoffs between enforcing one kind of memory safety over another.
- Not all memory safety techniques are equally safe.
+ Not all memory safety techniques are created equal.
</p>
<p>
- Below are papers that describe how attacks exploit memory safety errors
- for fun and profit. They're good to read; just don't make a career out
- of using them.
+ Below are papers that describe how attacks exploit memory safety errors.
+ They're good to read; just make sure you use them for research and not
+ for fun and profit.
</p>
<a name="Papers"></a>
<h1>Memory Safety Exploit Papers</h1>
<ul>
- <li><a href="http://llvm.org/pubs/2009-08-12-UsenixSecurity-SafeSVAOS.html">
+ <li>
+ <a href="https://db.usenix.org/events/sec05/tech/full_papers/chen/chen.pdf">
<b>
- Memory Safety for Low-Level Software/Hardware Interactions
+ Non-Control-Data Attacks Are Realistic Threats
</b></a>
<br>
- John Criswell, Nicolas Geoffray, and Vikram Adve
+ Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and
+ Ravishankar K. Iyer
<br>
- <i>Proceedings of the Eighteenth USENIX Security Symposium</i>,
- Montreal, Canada, August 2009.
+ <i>Proceedings of the Fourteenth USENIX Security Symposium</i>,
+ Baltimore, MD, August 2005.
</li>
<br>
- <li><a href="http://llvm.org/pubs/2007-SOSP-SVA.html">
+ <li>
+ <a href="http://whitepapers.zdnet.com/abstract.aspx?docid=1296547">
<b>
- Secure Virtual Architecture: A Safe Execution Environment for Commodity
- Operating Systems</b></a>
+ Dangling Pointer: Smashing the Pointer for Fun and Profit</b></a>
<br>
- John Criswell, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve
+ Jonathan Afek and Adi Sharabani
<br>
- <i>Proceedings of the Twenty First ACM Symposium on Operating Systems
- Principles (SOSP '07)</i>, Stevenson, WA, October 2007.
+ Whitepaper, 2007.
<br>
- <b> <font color="#FF00FF">
- Received an SOSP 2007 Audience Choice Award.
- </font></b>
</li>
-
- <br>
-
- <li>
- <a href="http://llvm.org/pubs/2006-06-18-WIOSCA-LLVAOS.html">
- <b>
- A Virtual Instruction Set
- Interface for Operating System Kernels</b></a>
- <br>
- John Criswell, Brent Monroe, and Vikram Adve.<br><i>
- Workshop on the Interaction between Operating Systems and Computer
- Architecture (WIOSCA '06)</i>, Boston, Massachusetts, 2006.<br></li>
</ul>
</li>
</div>
Index: llvm-www/safecode/menagerie/index.html
diff -u llvm-www/safecode/menagerie/index.html:1.2 llvm-www/safecode/menagerie/index.html:1.3
--- llvm-www/safecode/menagerie/index.html:1.2 Thu Jun 10 17:32:32 2010
+++ llvm-www/safecode/menagerie/index.html Thu Jun 17 09:15:41 2010
@@ -82,30 +82,9 @@
<ul>
<li>
- June 10, 2010:
- New Paper by WhatsHisName was published in AGoodConference
+ June 9, 2010: Started creation of the menagerie.
</li>
</ul>
-<!--
- <p>
- The motivation for the menagerie was the lack of communication I
- observed between reseachers on memory safety. Memory safety underlies
- security for C programs as well as soundness of compiler analyses. It
- therefore tends to be studied by the security community (which
- publishes in both security and operating system related conferences) as
- well as the compiler and programming language communities (which
- publishes in compiler and programming language conferences). The sheer
- number of communities and conferences make memory safety research hard
- to follow, so it's no wonder that researchers often do not either know
- about the work of their peers or misunderstand it.
- </p>
-
- <p>
- This web site aims to be a one-stop shop for memory safety research and
- to provide an adequeate (overwhelming?) review of the literature to
- budding memory-safety researchers.
- </p>
--->
</div>
<!--#include virtual="sidebar.incl" -->
Index: llvm-www/safecode/menagerie/memsafety.html
diff -u llvm-www/safecode/menagerie/memsafety.html:1.3 llvm-www/safecode/menagerie/memsafety.html:1.4
--- llvm-www/safecode/menagerie/memsafety.html:1.3 Thu Jun 10 23:32:43 2010
+++ llvm-www/safecode/menagerie/memsafety.html Thu Jun 17 09:15:41 2010
@@ -99,7 +99,6 @@
<br>
-
<li>
<a href="http://www.cis.upenn.edu/acg/papers/pldi09_softbound.pdf">
<b>
@@ -114,6 +113,20 @@
<br>
+ <li>
+ <a href="https://db.usenix.org/events/osdi06/tech/full_papers/castro/castro.pdf">
+ <b>
+ Securing Software by Enforcing Data-Flow Integrity
+ </b></a>
+ <br>
+ Miguel Castro, Manuel Costa, and Tim Harris
+ <br>
+ Seventh USENIX Symposium on Operating Systems Design and
+ Implementation, November 2006.
+ </li>
+
+ <br>
+
<li><a href="http://llvm.org/pubs/2006-DSN-DanglingPointers.html">
<b>
Efficiently Detecting All Dangling Pointer Uses in Production Servers
@@ -121,7 +134,8 @@
<br>
Dinakar Dhurjati and Vikram Adve.
<br>
- International Conference on Dependable Systems and Networks (DSN), 2006
+ International Conference on Dependable Systems and Networks (DSN), June
+ 2006
</li>
<br>
@@ -191,6 +205,19 @@
<br>
<li>
+ <a href="http://www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Ruwase.pdf"><b>
+ A Practical Dynamic Buffer Overflow Detector
+ </b></a>
+ <br>
+ Olatunji Ruwase and Monica S. Lam.
+ <br>
+ Proceedings of the Network and Distributed System Security (NDSS)
+ Symposium, February 2004.
+ </li>
+
+ <br>
+
+<li>
<a href="http://llvm.org/pubs/2003-05-05-LCTES03-CodeSafety.html"><b>
Memory Safety without Runtime Checks or Garbage Collection for Embedded
Systems
@@ -214,6 +241,20 @@
Internaltional Conference on Compilers, Architecture and Synthesis for
Embedded Systems (CASES), October 2002.
</li>
+
+ <br>
+
+ <li>
+ <a href="http://hpc.doc.ic.ac.uk/~phjk/Publications/BoundsCheckingForC.ps.gz"><b>
+ Backwards-Compatible Bounds Checking for Arrays and Pointers in C
+ Programs
+ </b></a>
+ <br>
+ Richard W. M. Jones and Paul H. J. Kelly.
+ <br>
+ Third International Workshop on Automated Debugging, May 1997.
+ </li>
+
</div>
<!--#include virtual="sidebar.incl" -->
Index: llvm-www/safecode/menagerie/other.html
diff -u llvm-www/safecode/menagerie/other.html:1.2 llvm-www/safecode/menagerie/other.html:1.3
--- llvm-www/safecode/menagerie/other.html:1.2 Thu Jun 10 17:32:32 2010
+++ llvm-www/safecode/menagerie/other.html Thu Jun 17 09:15:41 2010
@@ -63,8 +63,8 @@
semantic behavior, it is not the only approach to thwarting such attacks.
Information flow, randomization, and canaries have also been used to
detect attacks against undefined C program behavior. A researcher in
- memory safety should also be aware of these techniques and understand why
- memory safety is a more comprehensive technique.
+ memory safety should also be aware of these techniques and understand the
+ tradeoffs between full memory safety and these other techniques.
</p>
<p>
@@ -76,40 +76,43 @@
<h1>Information Flow Papers</h1>
<ul>
- <li><a href="http://llvm.org/pubs/2009-08-12-UsenixSecurity-SafeSVAOS.html">
+ </ul>
+
+ <a name="random"></a>
+ <h1>Randomization Papers</h1>
+
+ <a name="adhoc"></a>
+ <h1>Miscellaneous Papers</h1>
+
+ <ul>
+ <li><a href="http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND10.pdf">
<b>
- Memory Safety for Low-Level Software/Hardware Interactions
+ HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor
+ Control-Flow Integrity
</b></a>
<br>
- John Criswell, Nicolas Geoffray, and Vikram Adve
+ Zhi Wang and Xuxian Jiang.
+ <br>
+ <i>Proceedings of the Thirty First IEEE Symposium on Security and
+ Privacy</i>,
+ Oakland, CA, May 2010.
<br>
- <i>Proceedings of the Eighteenth USENIX Security Symposium</i>,
- Montreal, Canada, August 2009.
</li>
<br>
- <li><a href="http://llvm.org/pubs/2007-SOSP-SVA.html">
+ <li><a href="http://portal.acm.org/citation.cfm?id=1755913.1755934">
<b>
- Secure Virtual Architecture: A Safe Execution Environment for Commodity
- Operating Systems</b></a>
+ Defeating return-oriented rootkits with "Return-Less" kernels
+ </b></a>
<br>
- John Criswell, Andrew Lenharth, Dinakar Dhurjati, and Vikram Adve
+ Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram.
<br>
- <i>Proceedings of the Twenty First ACM Symposium on Operating Systems
- Principles (SOSP '07)</i>, Stevenson, WA, October 2007.
+ <i>Proceedings of the Fifth European conference on Computer systems</i>,
+ Paris, France, April 2010.
<br>
- <b> <font color="#FF00FF">
- Received an SOSP 2007 Audience Choice Award.
- </font></b>
</li>
- </ul>
-
- <a name="random"></a>
- <h1>Randomization Papers</h1>
-
- <a name="adhoc"></a>
- <h1>Ad Hoc Technique Papers</h1>
+ </ul>
</div>
<!--#include virtual="sidebar.incl" -->
More information about the llvm-commits
mailing list