Tiffany Tang

Learn More
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as(More)
—Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones such as(More)
This paper describes an gesture-based system suitable for use in a party. With the Microsoft Kinect for Windows sensor, LEDs or lamps, Arduino, and a set of Relay Shield for Arduino, our module creates an immersive ambient entertainment environment that is responsive and sensitive to the presence of users reflected by their gestures, feet movements, and can(More)
In this thesis, we argue that software-based defenses to code reuse attacks are fundamentally flawed. With code pointer integrity as a case study, we show that a secure and efficient software-based defense to code reuse attacks is impossible and thus motivate the case for hardware approaches. We then propose our tagged architecture system Taxi (Tagged C) as(More)
  • 1