The complexity of modern software systems, the integration of several software components, and the increasing exposure to public networks make systems more susceptible to cyber-attacks, especially those targeting memory. Memory error exploitation received worldwide attention thanks to the Morris worm in 1988 and has been around for over 30 years. As a matter of fact, attacks that involve memory safety, such as buffer overflows, are still a plague in modern software. The research in countering those kinds of attacks has gone in several directions. This work surveys memory integrity techniques developed during the last quarter century for embedded or general-purpose open-source operating systems, ranging from older mechanisms to state-of-the-art solutions. A comparison of various memory integrity techniques is presented to examine their effectiveness and technical significance. Insights into ongoing trends and developments are also provided to assess their potential impact in the foreseeable future.
Memory Integrity Techniques for Memory-Unsafe Languages: A Survey / EFTEKHARI MOGHADAM, Vahid; Serra, Gabriele; Aromolo, Federico; Buttazzo, Giorgio; Prinetto, Paolo. - In: IEEE ACCESS. - ISSN 2169-3536. - ELETTRONICO. - 12:(2024), pp. 43201-43221. [10.1109/ACCESS.2024.3380478]
Memory Integrity Techniques for Memory-Unsafe Languages: A Survey
EFTEKHARI MOGHADAM, VAHID;SERRA, GABRIELE;BUTTAZZO, GIORGIO;PRINETTO, PAOLO
2024
Abstract
The complexity of modern software systems, the integration of several software components, and the increasing exposure to public networks make systems more susceptible to cyber-attacks, especially those targeting memory. Memory error exploitation received worldwide attention thanks to the Morris worm in 1988 and has been around for over 30 years. As a matter of fact, attacks that involve memory safety, such as buffer overflows, are still a plague in modern software. The research in countering those kinds of attacks has gone in several directions. This work surveys memory integrity techniques developed during the last quarter century for embedded or general-purpose open-source operating systems, ranging from older mechanisms to state-of-the-art solutions. A comparison of various memory integrity techniques is presented to examine their effectiveness and technical significance. Insights into ongoing trends and developments are also provided to assess their potential impact in the foreseeable future.File | Dimensione | Formato | |
---|---|---|---|
Memory_Integrity_Techniques_for_Memory-Unsafe_Languages_A_Survey.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Creative commons
Dimensione
566.35 kB
Formato
Adobe PDF
|
566.35 kB | Adobe PDF | Visualizza/Apri |
Memory_Integrity_Techniques_for_Memory-Unsafe_Languages_A_Survey.pdf
accesso aperto
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Creative commons
Dimensione
5.29 MB
Formato
Adobe PDF
|
5.29 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2987203