|Title||Fat Pointers for Temporal Memory Safety of C|
|Publication Type||Journal Article|
|Year of Publication||2022|
|Authors||Zhou, J, Criswell, J, Hicks, M|
|Keywords||Cryptography and Security (cs.CR), FOS: Computer and information sciences|
Temporal memory safety bugs, especially use-after-free and double free bugs, pose a major security threat to C programs. Real-world exploits utilizing these bugs enable attackers to read and write arbitrary memory locations, causing disastrous violations of confidentiality, integrity, and availability. Many previous solutions retrofit temporal memory safety to C, but they all either incur high performance overhead and/or miss detecting certain types of temporal memory safety bugs.