SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

NDSS 2014
Published: Jan 1, 2014
Abstract
Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These attacks can hijack program control flow whenever a virtual method of a corrupted object...
Paper Fields
Paper Details
Title
SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks
Published Date
Jan 1, 2014
Journal
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.