{"title":"英特尔®MPX的简要评估","authors":"Christian Otterstad","doi":"10.1109/SYSCON.2015.7116720","DOIUrl":null,"url":null,"abstract":"MPX implements hardware accelerated support for detection and prevention of memory corruption. This paper will examine the effectiveness of MPX. Herein we attempt to find false positives and false negatives, and to determine what attacks may still be feasible. In particular we wish to see if a system protected by MPX is still exploitable. Intel MPX appears to provide a solid mitigation technique, but may be vulnerable in special circumstances related to how it depends on the surrounding framework to function.","PeriodicalId":251318,"journal":{"name":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A brief evaluation of Intel®MPX\",\"authors\":\"Christian Otterstad\",\"doi\":\"10.1109/SYSCON.2015.7116720\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"MPX implements hardware accelerated support for detection and prevention of memory corruption. This paper will examine the effectiveness of MPX. Herein we attempt to find false positives and false negatives, and to determine what attacks may still be feasible. In particular we wish to see if a system protected by MPX is still exploitable. Intel MPX appears to provide a solid mitigation technique, but may be vulnerable in special circumstances related to how it depends on the surrounding framework to function.\",\"PeriodicalId\":251318,\"journal\":{\"name\":\"2015 Annual IEEE Systems Conference (SysCon) Proceedings\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Annual IEEE Systems Conference (SysCon) Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SYSCON.2015.7116720\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Annual IEEE Systems Conference (SysCon) Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSCON.2015.7116720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
MPX implements hardware accelerated support for detection and prevention of memory corruption. This paper will examine the effectiveness of MPX. Herein we attempt to find false positives and false negatives, and to determine what attacks may still be feasible. In particular we wish to see if a system protected by MPX is still exploitable. Intel MPX appears to provide a solid mitigation technique, but may be vulnerable in special circumstances related to how it depends on the surrounding framework to function.