Constraint injection system for immunizing software programs against vulnerabilities and attacks

作者: Sandy Wilbourn , Saman P. Amarasinghe , Timothy Garnett , Bharath Chandramohan , Charles Renert

DOI:

关键词:

摘要: A constraint is inserted into a program to address vulnerability of the attacks. The includes segment code that determines when has been asked execute “corner case” which does not occur in normal operations. can access library detector and remediator functions detect various attacks remediate against them. Optionally, be employed without for analysis. context saved restored if necessary continue operating after remediation performed. constraints include descriptors, along with machine instructions or byte code, indicate how are used.