search for: menagerie

Displaying 20 results from an estimated 22 matches for "menagerie".

2012 May 24
2
[LLVMdev] -fbounds-checking vs {SAFECode,ASan}
...ay they do; I'd recommend run-time checks on indirect function calls and a split-stack approach that allows checks on stores to just mask off bits in the pointer address to prevent them from overwriting the return address on the stack. As an aside, I have a web site called the Memory Safety Menagerie (http://sva.cs.illinois.edu/menagerie/index.html) that lists papers on the topic of memory safety attack mitigation. Those interested in exploring the mitigation options might find it useful. -- John T. (*) Attacks that only change data-flow are possible and practical, but I think these are...
2012 May 25
0
[LLVMdev] -fbounds-checking vs {SAFECode,ASan}
...ecommend > run-time checks on indirect function calls and a split-stack approach > that allows checks on stores to just mask off bits in the pointer > address to prevent them from overwriting the return address on the stack. > > As an aside, I have a web site called the Memory Safety Menagerie > (http://sva.cs.illinois.edu/menagerie/index.html) that lists papers on > the topic of memory safety attack mitigation. Those interested in > exploring the mitigation options might find it useful. > > -- John T. > > (*) Attacks that only change data-flow are possible and prac...
2012 Oct 02
0
[LLVMdev] [PROPOSAL] Adding support for -fstack-protector-strong
...en better since they also stop non-control data attacks. Getting good performance out of them is difficult, though, and depending on what sorts of overhead you're willing to tolerate, getting good performance is still an open research question. You might want to check out the memory safety menagerie (http://sva.cs.illinois.edu/menagerie). It has lots of papers on various techniques and optimizations for those techniques. You might find something that will give you the security you want at the performance you need. In short, I think working on something that provides more comprehensive...
2012 May 24
0
[LLVMdev] -fbounds-checking vs {SAFECode,ASan}
Hi Kostya, I'm also curious to know where Nuno is going with this, and the details of his design. I'm worried he might be reinventing the wheel. I'm also worried that he may be inventing a square wheel :) > I noticed your commits related to -fbounds-checking and have some questions. > The functionality of this new phase seems to (partially?) overlap with > AddressSanitizer
2016 Jan 28
2
Intel MPX support (instrumentation pass similar to gcc's Pointer Checker)
Hello, As far as I know, there is no MPX pass in LLVM (though the x86-64 backend already declares MPX registers and instructions). I wonder if anyone is currently working on the LLVM pass for MPX instrumentation, similar to Pointer Checker in gcc. If yes, could anyone elaborate on the status and accessability to other researchers? And if any help is needed? Prof. Santosh Nagarakatte, the author
2015 Sep 01
2
llvm cfi
...x86-64 for the KCoFI > project is available at https://github.com/jtcriswell/SVA. You'll need > to create the exploit code (and potentially the vulnerability) yourself. > If you read the literature on CFI and memory safety (some of which is > cataloged at http://sva.cs.illinois.edu/menagerie), you should be able to > find programs and vulnerabilities that have been used in such experiments. > > I think there are lots of program fragment in the literature. Is there any complete program to show that cfi can protect control flow? It's just a basic theory display, not academic...
2016 May 26
1
Runtime interception: design problem
Hi John, On 25 May 2016 at 16:11, John Criswell <jtcriswel at gmail.com> wrote: > Dear Pierre, > > Stepping up a level, what is your goal in replacing calls to malloc() and > free()? Is it any different than what SAFECode, SoftBound, or ASan do? > That's a good question. I didn't knew about SoftBound until now, so thank you for the name =). Anyway here is what I
2014 Apr 15
4
[LLVMdev] Alignments in LLVM IR
Hello, I am currently writing my Master's Thesis on a topic regarding the analysis of memory safety and termination of LLVM programs. This includes alignments in LLVM IR, but I am not sure if I understand their semantics correctly. I have written a program (see attachment) which uses the instruction store i32 1, i32* %7, align 4 to store an integer at an address that I forced to be
2015 Sep 01
5
llvm cfi
I want to create an experiment to show the effectiveness of cfi : For example , I first need a program with vulnerability so that we can hijack its control flow; then I enforce cfi of llvm and we can't hijack its control flow. Do you have any advice for me? - mudongliang -------------- next part -------------- An HTML attachment was scrubbed... URL:
2012 Oct 02
5
[LLVMdev] [PROPOSAL] Adding support for -fstack-protector-strong
Hello, I plan to implement "Stack Smashing Protection - Strong" support in LLVM. Below is a description of this feature and an overview of the implementation plan. I have divided up the implementation into stages that can be delivered incrementally. I'm looking for any feedback (suggestions, requests, etc) before I actually begin the work. Thank you! Josh
2013 Sep 09
0
[LLVMdev] Adding diversity for security (and testing)
On 29 August 2013 15:29, Stephen Crane <sjcrane at uci.edu> wrote: > On 08/28/2013 02:37 PM, Nick Lewycky wrote: > >> 1. I'm concerned about the deployment problem. I realize that being in >> the compiler means you can transform the program in more exciting ways, but >> it gives you a much worse deployment story than something which modifies >> the program
2012 May 24
5
[LLVMdev] -fbounds-checking vs {SAFECode,ASan}
Hi Nuno, I noticed your commits related to -fbounds-checking and have some questions. The functionality of this new phase seems to (partially?) overlap with AddressSanitizer and SAFECode, so I am curious how would you compare the two existing tools with the new one. Earlier you wrote: >> So the main idea of this new flag is not for debugging, but rather for production. >> This means
2012 Mar 30
0
[LLVMdev] Google Summer of Code proposal: Adding memory safety checks to the LLVM bitcodes
...; tool project off the open projects page as there are now several memory safety tools built using LLVM. If you want my opinion, I think the static array bounds checker or the monotonic loop optimization make nice, self-contained projects. Finally, you might be interested in the Memory Safety Menagerie (http://sva.cs.illinois.edu/menagerie/). This web page contains a whole list of papers on the subject of memory safety transforms. -- John T. > > > ================================================ > Adding memory safety checks to the LLVM bitcodes > =============================...
2013 Aug 29
3
[LLVMdev] Adding diversity for security (and testing)
On 08/28/2013 02:37 PM, Nick Lewycky wrote: > 1. I'm concerned about the deployment problem. I realize that being in > the compiler means you can transform the program in more exciting > ways, but it gives you a much worse deployment story than something > which modifies the program on disk like "prelink". Yes, definitely. Deployment is an issue which users will need
2008 Jan 28
6
Bug#462989: add missing header file for libvirt build
Package: libxen-dev Version: 3.2.0-2 Severity: wishlist Tags: patch Hi, libvirt needs privcmd.h to build. Please apply. Thanks for building a libxen-dev package, -- Guido Index: xen-3-3.2.0/debian/libxen-dev.install =================================================================== --- xen-3-3.2.0.orig/debian/libxen-dev.install 2008-01-28 18:43:43.000000000 +0000 +++
2012 Mar 30
4
[LLVMdev] Google Summer of Code proposal: Adding memory safety checks to the LLVM bitcodes
Dear LLVMers, My name is Raphael Ernani, and I am doing my MsC at the Federal University of Minas Gerais, Brazil. I have been using LLVM for a while, and I would like to participate in this year's Summer of Code. One particular idea, in your "open projects" page caught my eye, and I decided to write a proposal about it. The line that I liked in the page was "Create an LLVM
2006 May 17
7
Quad BRI card
Hi all Does Digium make a quad BRI card? I can't see anything of the sort on their page but I thought they might call it something else in the States. Failing that, can anyone recommend a make/model that would handle 4 BRI ports? -- Cheers Wayne
2009 Dec 15
5
HVM support to be removed from Debian Squeeze: call for volunteers
[message cross posted to the pkg-xen and xen-devel list] Dear everyone, Bastian Blank - which is the person (among others, but mainly him) that is packaging Xen in Debian -, has decided last summer that he doesn't want to deal with the qemu-dm of Xen, thus removing Xen Qemu and support for HVM in Debian. Here is what he wrote:
2009 Dec 15
5
HVM support to be removed from Debian Squeeze: call for volunteers
[message cross posted to the pkg-xen and xen-devel list] Dear everyone, Bastian Blank - which is the person (among others, but mainly him) that is packaging Xen in Debian -, has decided last summer that he doesn't want to deal with the qemu-dm of Xen, thus removing Xen Qemu and support for HVM in Debian. Here is what he wrote:
2011 Apr 13
2
[LLVMdev] Requirements for the EH representation
...it involves separate objects, is encoded in special instructions, or is actually just annotations on BasicBlocks --- is something I leave open. IPO would be able to just move appropriate segments from this DAG between functions as it moves the affected code.] Languages and unwinders may support a menagerie of kinds of handlers and cleanups; for example, __gxx_personality_v0 allows the efficient encoding of a handler which calls std::terminate(). It can be a significant optimization to use these. Requirement: The representation should be capable of carrying an opaque channel of data about unwi...