Learn More
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as(More)
—Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as(More)
We report on the demonstration of three-dimensional optical trapping inside the core of a hollow-core microstructured optical fiber specifically designed and fabricated for this purpose. Optical trapping was achieved by means of an external tweezers beam incident transversely on the fiber and focused through the fiber cladding. Trapping was achieved for a(More)
This paper describes an gesture-based system suitable for use in a party. With the Microsoft Kinect for Windows sensor, LEDs or lamps, Arduino, and a set of Relay Shield for Arduino, our module creates an immersive ambient entertainment environment that is responsive and sensitive to the presence of users reflected by their gestures, feet movements, and can(More)
  • Samuel Fingeret, Howard Shrobe, +4 authors Stelios Sidiroglou-Douskos
  • 2015
In this thesis, we argue that software-based defenses to code reuse attacks are fundamentally flawed. With code pointer integrity as a case study, we show that a secure and efficient software-based defense to code reuse attacks is impossible and thus motivate the case for hardware approaches. We then propose our tagged architecture system Taxi (Tagged C) as(More)
  • 1