Sanitizers are widely used compiler features that detect undefined behavior and resulting vulnerabilities by injecting runtime checks …
The number of published software vulnerabilities is increasing every year. How do organizations stay in control of their attack surface …
Analyzing malicious behavior is vital to effectively safeguard computer systems against malware. However, contemporary malware …
Despite nearly decade-long mitigation efforts in academia and industry, the community is yet to find a practical solution to the …
Backward-edge control-flow hijacking via stack buffer overflow is the holy grail of software exploitation. The ability to directly …
Modern coverage-oriented fuzzers play a crucial role in vulnerability finding. While much research focuses on improving the core …
The ongoing global COVID-19 pandemic made working from home – wherever working remotely is possible – the norm for what had …
Use-after-free vulnerabilities remain difficult to detect and mitigate, making them a popular source of exploitation. Existing …
Branch Target Injection (BTI or Spectre v2) is one of the most dangerous transient execution vulnerabilities, as it allows an attacker …
Translation Lookaside Buffers, or TLBs, play a vital role in recent microarchitectural attacks. However, unlike CPU caches, we know …