Roman M. Rusiaev, M. Neiman-zade, A. Ermolitsky, Valery I. Perekatov, Vladimir Yu. Volkonsky
{"title":"Elbrus微处理器的各种缓冲区溢出检测方法","authors":"Roman M. Rusiaev, M. Neiman-zade, A. Ermolitsky, Valery I. Perekatov, Vladimir Yu. Volkonsky","doi":"10.1109/EnT.2016.034","DOIUrl":null,"url":null,"abstract":"A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.","PeriodicalId":356690,"journal":{"name":"2016 International Conference on Engineering and Telecommunication (EnT)","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Various Buffer Overflow Detection Means for Elbrus Microprocessors\",\"authors\":\"Roman M. Rusiaev, M. Neiman-zade, A. Ermolitsky, Valery I. Perekatov, Vladimir Yu. Volkonsky\",\"doi\":\"10.1109/EnT.2016.034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.\",\"PeriodicalId\":356690,\"journal\":{\"name\":\"2016 International Conference on Engineering and Telecommunication (EnT)\",\"volume\":\"16 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Engineering and Telecommunication (EnT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EnT.2016.034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Engineering and Telecommunication (EnT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EnT.2016.034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Various Buffer Overflow Detection Means for Elbrus Microprocessors
A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.