Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge, i.e., indirect calls through function pointers and virtual calls. Protecting the backwa ...
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. We show how an attacker can overrun a buffer to corrupt sensitive data or steer the execution flow by overwriting function pointers, e.g., manipulating the ...
As revitalization and protection against floods are essential in our time, the town of Delémont in Switzerland has set up a major project named “Delémont Marée Basse”. Part of the project, the residual risk plans to be managed by a lateral overflow bypassi ...
A compatible buffer system for the coupling of capillary electrophoresis (CE) with matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS) was developed. The employed interface consists of a robot to drive a sliver-covered separation capil ...
We study the effects of the vicinity between a shallow donor nucleus and an I1-type basal stacking fault (BSF) in GaN. We propose a numerical calculation, in the “effective potential” formalism, of energies and envelope functions of electrons submitted to ...
Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection i.e. insertion of random data into input files, buffers or protocol packets, combi ...