3,262 research outputs found

    Shining Light On Shadow Stacks

    Full text link
    Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge,i.e., indirect calls through function pointers and virtual calls. Protecting the backward edge is left to stack canaries, which are easily bypassed through information leaks. Shadow Stacks are a fully precise mechanism for protecting backwards edges, and should be deployed with CFI mitigations. We present a comprehensive analysis of all possible shadow stack mechanisms along three axes: performance, compatibility, and security. For performance comparisons we use SPEC CPU2006, while security and compatibility are qualitatively analyzed. Based on our study, we renew calls for a shadow stack design that leverages a dedicated register, resulting in low performance overhead, and minimal memory overhead, but sacrifices compatibility. We present case studies of our implementation of such a design, Shadesmar, on Phoronix and Apache to demonstrate the feasibility of dedicating a general purpose register to a security monitor on modern architectures, and the deployability of Shadesmar. Our comprehensive analysis, including detailed case studies for our novel design, allows compiler designers and practitioners to select the correct shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201

    IU Public Policy Institute

    Get PDF
    poster abstractThis poster will highlight some of the recent IU Public Policy Institute research projects. This will include projects from both the Center for Urban Policy and the Environment and the Center for Criminal Justice Research

    Enzymatic activity of the Arabidopsis sulfurtransferase resides in the C-terminal domain but is boosted by the N-terminal domain and the linker peptide in the full-length enzyme

    Get PDF
    Sulfurtransferases/rhodaneses are a group of enzymes widely distributed in plants, animals, and bacteria that catalyze the transfer of sulfur from a donor molecule to a thiophilic acceptor substrate. Sulfurtransferases (STs) consist of two globular domains of nearly identical size and conformation connected by a short linker sequence. In plant STs this linker sequence is exceptionally longer than in sequences from other species. The Arabidopsis ST1 protein (AJ131404) contains five cysteine residues: one residue is universally conserved in all STs and considered to be catalytically essential; a second one, closely located in the primary sequence, is conserved only in sequences from eukaryotic species. Of the remaining three cysteine residues two are conserved in the so far known plant STs and one is unique to the Arabidopsis ST1. The aim of our study was to investigate the role of the twodomain structure, of the unique plant linker sequence and of each cysteine residue. The N and C-terminal domains of the Arabidopsis ST1, the fulllength protein with a shortened linker sequence and several pointmutated proteins were overexpressed in E. coli, purified and used for enzyme activity measurements. The C-terminal domain itself displayed ST activity which could be increased by adding the separately prepared N-terminal domain. The activity of an ST1 derivative with a shortened linker sequence was reduced by more than 60% of the wild-type activity, probably because of a drastically reduced protein stability. The replacement of each cysteine residue resulted in mutant forms which differed significantly in their stability, in the specific ST activities, and in their kinetic parameters which were determined for 3-mercaptopyruvate as well as thiosulfate as sulfur substrates: mutation of the putative active site cysteine (C332) essentially abolished activity; for C339 a crucial role at least for the turnover of thiosulfate could be identified.DFG/PA/764/1-1DFG/PA/764/1-2Fonds der Chemischen Industri

    Why do women favor same-gender competition? Evidence from a choice experiment

    Full text link
    This paper addresses the behavioral puzzle of women's preference for competition when competitors are also women. Using a framed field experiment with 883 non-standard subjects, we show that none of the determinants of competitive behavior in general, including ability, self-confidence and risk aversion, provide a satisfying explanation for women's substantive gender-related selection into competition. Nonetheless, women who are overconfident, i.e. over-estimate own abilities in performing a task, enter competition regardless of the gender-mix. Hence, the gender-pairing phenomenon is driven by women who correctly estimate or under-estimate own ability. We concluded that this is due to stereotypes about women's underperformance compared to men

    Ponderomotive effects in multiphoton pair production

    Full text link
    The Dirac-Heisenberg-Wigner formalism is employed to investigate electron-positron pair production in cylindrically symmetric but otherwise spatially inhomogeneous, oscillating electric fields. The oscillation frequencies are hereby tuned to obtain multiphoton pair production in the nonperturbative threshold regime. An effective mass as well as a trajectory-based semi-classical analysis are introduced in order to interpret the numerical results for the distribution functions as well as for the particle yields and spectra. The results, including the asymptotic particle spectra, display clear signatures of ponderomotive forces.Comment: 9 pages, 3 Tables, 3 Figure
    corecore