Skip to main content

Showing 1–6 of 6 results for author: Volckaert, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.04788  [pdf, other

    cs.CR

    Garmr: Defending the gates of PKU-based sandboxing

    Authors: Alexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, Stijn Volckaert

    Abstract: Memory Protection Keys for Userspace (PKU) is a recent hardware feature that allows programs to assign virtual memory pages to protection domains, and to change domain access permissions using inexpensive, unprivileged instructions. Several in-process memory isolation approaches leverage this feature to prevent untrusted code from accessing sensitive program state and data. Typically, PKU-based is… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  2. arXiv:2011.02091  [pdf, other

    cs.CR

    dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting

    Authors: Alexios Voulimeneas, Dokyung Song, Per Larsen, Michael Franz, Stijn Volckaert

    Abstract: Multi-variant execution (MVX) systems amplify the effectiveness of software diversity techniques. The key idea is to run multiple diversified program variants in lockstep while providing them with the same input and monitoring their run-time behavior for divergences. Thus, adversaries have to compromise all program variants simultaneously to mount an attack successfully. Recent work proposed distr… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  3. arXiv:1903.03643  [pdf, other

    cs.CR

    DMON: A Distributed Heterogeneous N-Variant System

    Authors: Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert

    Abstract: N-Variant Execution (NVX) systems utilize software diversity techniques for enhancing software security. The general idea is to run multiple different variants of the same program alongside each other while monitoring their run-time behavior. If the internal disparity between the running variants causes observable differences in response to malicious inputs, the monitor can detect such divergences… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

  4. arXiv:1806.04355  [pdf, other

    cs.CR cs.PL

    SoK: Sanitizing for Security

    Authors: Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz

    Abstract: The C and C++ programming languages are notoriously insecure yet remain indispensable. Developers therefore resort to a multi-pronged approach to find security issues before adversaries. These include manual, static, and dynamic program analysis. Dynamic bug finding tools --- henceforth "sanitizers" --- can find bugs that elude other types of analysis because they observe the actual execution of a… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

  5. arXiv:1711.08108  [pdf, other

    cs.CR

    PartiSan: Fast and Flexible Sanitization via Run-time Partitioning

    Authors: Julian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, Michael Franz

    Abstract: Sanitizers can detect security vulnerabilities in C/C++ code that elude static analysis. Current practice is to continuously fuzz and sanitize internal pre-release builds. Sanitization-enabled builds are rarely released publicly. This is in large part due to the high memory and processing requirements of sanitizers. We present PartiSan, a run-time partitioning technique that speeds up sanitizers… ▽ More

    Submitted 14 May, 2018; v1 submitted 21 November, 2017; originally announced November 2017.

  6. arXiv:1607.07841  [pdf, other

    cs.CR cs.DC

    Multi-Variant Execution of Parallel Programs

    Authors: Stijn Volckaert, Bjorn De Sutter, Koen De Bosschere, Per Larsen

    Abstract: Multi-Variant Execution Environments (MVEEs) are a promising technique to protect software against memory corruption attacks. They transparently execute multiple, diversified variants (often referred to as replicae) of the software receiving the same inputs. By enforcing and monitoring the lock-step execution of the replicae's system calls, and by deploying diversity techniques that prevent an att… ▽ More

    Submitted 26 July, 2016; originally announced July 2016.