BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Preventing memory error exploits with WIT - Periklis Akritidis (Un
 iversity of Cambridge)
DTSTART:20080327T163000Z
DTEND:20080327T173000Z
UID:TALK10586@talks.cam.ac.uk
CONTACT:Eiko Yoneki
DESCRIPTION:Attacks often exploit memory errors to gain control over the e
 xecution of vulnerable programs. These attacks remain a serious problem de
 spite previous research on techniques to prevent them. We believe there ar
 e two reasons for this: techniques that are used to prevent these attacks 
 fail to prevent many attacks\; and most techniques are not used because th
 ey have high overhead or they require non-trivial changes to the source co
 de or the language runtime. We present Write Integrity Testing (WIT)\, a n
 ew technique that provides practical protection from these attacks. We dis
 cuss an efficient implementation with optimizations to reduce space and ti
 me overhead. This implementation can be used in practice because it compil
 es C and C++ programs without modifications\, it has high coverage with no
  false positives\, and it has low overhead.\n \nPeriklis Akritidis is a se
 cond year PhD student with the Systems Research Group\nunder the supervisi
 on of Dr. Steven Hand.\nThis is joint work with Cristian Cadar\, Costin Ra
 iciu\, Manuel Costa and Miguel Castro from Microsoft Research.\n
LOCATION:Lecture Theatre 2\, Computer Laboratory\, William Gates Builiding
END:VEVENT
END:VCALENDAR
