3,262 research outputs found
Shining Light On Shadow Stacks
Control-Flow Hijacking attacks are the dominant attack vector against C/C++
programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the
forward edge,i.e., indirect calls through function pointers and virtual calls.
Protecting the backward edge is left to stack canaries, which are easily
bypassed through information leaks. Shadow Stacks are a fully precise mechanism
for protecting backwards edges, and should be deployed with CFI mitigations. We
present a comprehensive analysis of all possible shadow stack mechanisms along
three axes: performance, compatibility, and security. For performance
comparisons we use SPEC CPU2006, while security and compatibility are
qualitatively analyzed. Based on our study, we renew calls for a shadow stack
design that leverages a dedicated register, resulting in low performance
overhead, and minimal memory overhead, but sacrifices compatibility. We present
case studies of our implementation of such a design, Shadesmar, on Phoronix and
Apache to demonstrate the feasibility of dedicating a general purpose register
to a security monitor on modern architectures, and the deployability of
Shadesmar. Our comprehensive analysis, including detailed case studies for our
novel design, allows compiler designers and practitioners to select the correct
shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201
IU Public Policy Institute
poster abstractThis poster will highlight some of the recent IU Public Policy Institute research projects. This will include projects from both the Center for Urban Policy and the Environment and the Center for Criminal Justice Research
Enzymatic activity of the Arabidopsis sulfurtransferase resides in the C-terminal domain but is boosted by the N-terminal domain and the linker peptide in the full-length enzyme
Sulfurtransferases/rhodaneses are a group of enzymes widely distributed in plants, animals, and bacteria that catalyze the transfer of sulfur from a donor molecule to a thiophilic acceptor substrate. Sulfurtransferases (STs) consist of two globular domains of nearly identical size and conformation connected by a short linker sequence. In plant STs this linker sequence is exceptionally longer than in sequences from other species. The Arabidopsis ST1 protein (AJ131404) contains five cysteine residues: one residue is universally conserved in all STs and considered to be catalytically essential; a second one, closely located in the primary sequence, is conserved only in sequences from eukaryotic species. Of the remaining three cysteine residues two are conserved in the so far known plant STs and one is unique to the Arabidopsis ST1. The aim of our study was to investigate the role of the twodomain structure, of the unique plant linker sequence and of each cysteine residue. The N and C-terminal domains of the Arabidopsis ST1, the fulllength protein with a shortened linker sequence and several pointmutated proteins were overexpressed in E. coli, purified and used for enzyme activity measurements. The C-terminal domain itself displayed ST activity which could be increased by adding the separately prepared N-terminal domain. The activity of an ST1 derivative with a shortened linker sequence was reduced by more than 60% of the wild-type activity, probably because of a drastically reduced protein stability. The replacement of each cysteine residue resulted in mutant forms which differed significantly in their stability, in the specific ST activities, and in their kinetic parameters which were determined for 3-mercaptopyruvate as well as thiosulfate as sulfur substrates: mutation of the putative active site cysteine (C332) essentially abolished activity; for C339 a crucial role at least for the turnover of thiosulfate could be identified.DFG/PA/764/1-1DFG/PA/764/1-2Fonds der Chemischen Industri
Why do women favor same-gender competition? Evidence from a choice experiment
This paper addresses the behavioral puzzle of women's preference for competition when competitors are also women. Using a framed field experiment with 883 non-standard subjects, we show that none of the determinants of competitive behavior in general, including ability, self-confidence and risk aversion, provide a satisfying explanation for women's substantive gender-related selection into competition. Nonetheless, women who are overconfident, i.e. over-estimate own abilities in performing a task, enter competition regardless of the gender-mix. Hence, the gender-pairing phenomenon is driven by women who correctly estimate or under-estimate own ability. We concluded that this is due to stereotypes about women's underperformance compared to men
Ponderomotive effects in multiphoton pair production
The Dirac-Heisenberg-Wigner formalism is employed to investigate
electron-positron pair production in cylindrically symmetric but otherwise
spatially inhomogeneous, oscillating electric fields. The oscillation
frequencies are hereby tuned to obtain multiphoton pair production in the
nonperturbative threshold regime. An effective mass as well as a
trajectory-based semi-classical analysis are introduced in order to interpret
the numerical results for the distribution functions as well as for the
particle yields and spectra. The results, including the asymptotic particle
spectra, display clear signatures of ponderomotive forces.Comment: 9 pages, 3 Tables, 3 Figure
- …
