Sciweavers

67 search results - page 1 / 14
» The Performance Cost of Shadow Stacks and Stack Canaries
Sort
View
ACSAC
2006
IEEE
13 years 10 months ago
Extended Protection against Stack Smashing Attacks without Performance Loss
In this paper we present an efficient countermeasure against stack smashing attacks. Our countermeasure does not rely on secret values (such as canaries) and protects against att...
Yves Younan, Davide Pozza, Frank Piessens, Wouter ...
COMSWARE
2006
IEEE
13 years 8 months ago
A measurement study of the Linux TCP/IP stack performance and scalability on SMP systems
The performance of the protocol stack implementation of an operating system can greatly impact the performance of networked applications that run on it. In this paper, we present a...
Shourya P. Bhattacharya, Varsha Apte
DIMVA
2011
12 years 8 months ago
Code Pointer Masking: Hardening Applications against Code Injection Attacks
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
Pieter Philippaerts, Yves Younan, Stijn Muylle, Fr...
EMSOFT
2010
Springer
13 years 2 months ago
Reducing stack with intra-task threshold priorities in real-time systems
In the design of hard real-time systems, the feasibility of the task set is one of the primary concerns. However, in embedded systems with scarce resources, optimizing resource us...
Gang Yao, Giorgio C. Buttazzo
EWSN
2011
Springer
12 years 8 months ago
The Announcement Layer: Beacon Coordination for the Sensornet Stack
Sensornet protocols periodically broadcast beacons for neighborhood information advertisement, but beacon transmissions are costly when power-saving radio duty cycling mechanisms a...
Adam Dunkels, Luca Mottola, Nicolas Tsiftes, Fredr...