The complexity of modern software systems, the integration of several software components, and the increasing exposure to public networks make systems more susceptible to cyber-attacks, especially those targeting memory. Memory error exploitation received worldwide attention thanks to the Morris worm in 1988 and has been around for over 30 years. As a matter of fact, attacks that involve memory safety, such as buffer overflows, are still a plague in modern software. The research in countering those kinds of attacks has gone in several directions. This work surveys memory integrity techniques developed during the last quarter century for embedded or general-purpose open-source operating systems, ranging from older mechanisms to state-of-the-art solutions. A comparison of various memory integrity techniques is presented to examine their effectiveness and technical significance. Insights into ongoing trends and developments are also provided to assess their potential impact in the foreseeable future.

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey / EFTEKHARI MOGHADAM, Vahid; Serra, Gabriele; Aromolo, Federico; Buttazzo, Giorgio; Prinetto, Paolo. - In: IEEE ACCESS. - ISSN 2169-3536. - ELETTRONICO. - 12:(2024), pp. 43201-43221. [10.1109/ACCESS.2024.3380478]

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey

EFTEKHARI MOGHADAM, VAHID;SERRA, GABRIELE;BUTTAZZO, GIORGIO;PRINETTO, PAOLO
2024

Abstract

The complexity of modern software systems, the integration of several software components, and the increasing exposure to public networks make systems more susceptible to cyber-attacks, especially those targeting memory. Memory error exploitation received worldwide attention thanks to the Morris worm in 1988 and has been around for over 30 years. As a matter of fact, attacks that involve memory safety, such as buffer overflows, are still a plague in modern software. The research in countering those kinds of attacks has gone in several directions. This work surveys memory integrity techniques developed during the last quarter century for embedded or general-purpose open-source operating systems, ranging from older mechanisms to state-of-the-art solutions. A comparison of various memory integrity techniques is presented to examine their effectiveness and technical significance. Insights into ongoing trends and developments are also provided to assess their potential impact in the foreseeable future.
2024
File in questo prodotto:
File Dimensione Formato  
Memory_Integrity_Techniques_for_Memory-Unsafe_Languages_A_Survey.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Creative commons
Dimensione 566.35 kB
Formato Adobe PDF
566.35 kB Adobe PDF Visualizza/Apri
Memory_Integrity_Techniques_for_Memory-Unsafe_Languages_A_Survey.pdf

accesso aperto

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Creative commons
Dimensione 5.29 MB
Formato Adobe PDF
5.29 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2987203