Aug. 30, 2022, 1:20 a.m. | Jie Zhou, John Criswell, Michael Hicks

cs.CR updates on arXiv.org arxiv.org

Temporal memory safety bugs, especially use-after-free and double free bugs,
pose a major security threat to C programs. Real-world exploits utilizing these
bugs enable attackers to read and write arbitrary memory locations, causing
disastrous violations of confidentiality, integrity, and availability. Many
previous solutions retrofit temporal memory safety to C, but they all either
incur high performance overhead and/or miss detecting certain types of temporal
memory safety bugs.


In this paper, we propose a temporal memory safety solution that is both …

memory safety temporal

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel

Information Security Operations Officer

@ International Labour Organization | Geneva, CH, 1200

PMO Cybersécurité H/F

@ Hifield | Sèvres, France

Third Party Risk Management - Consultant

@ KPMG India | Bengaluru, Karnataka, India

Consultant Cyber Sécurité H/F - Strasbourg

@ Hifield | Strasbourg, France