Feb. 16, 2023, 2:10 a.m. | So Shizukuishi, Yoshitaka Arahori, Katsuhiko Gondow

cs.CR updates on arXiv.org arxiv.org

Although numerous defenses against memory vulnerability exploits have been
studied so far, highly-compatible, precise, and efficient defense is still an
open problem. In fact, existing defense methods have at least one of the
following problems: they (1) cannot precisely protect structure fields, (2)
incur high protection overheads, and/or (3) cannot maintain compatibility with
existing code due to imposing memory layout change on the protected program.


In this paper, we propose a novel memory-protection method FIX-Sense that
aims to solve all …

change code data defense exploits fact flow high integrity memory novel precisely problem problems program protect protection sensitive data vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Compliance Advisor

@ SAP | Budapest, HU, 1031

DevSecOps Engineer

@ Qube Research & Technologies | London

Software Engineer, Security

@ Render | San Francisco, CA or Remote (USA & Canada)

Associate Consultant

@ Control Risks | Frankfurt, Hessen, Germany

Senior Security Engineer

@ Activision Blizzard | Work from Home - CA