9,884 research outputs found

    Shining Light On Shadow Stacks

    Full text link
    Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge,i.e., indirect calls through function pointers and virtual calls. Protecting the backward edge is left to stack canaries, which are easily bypassed through information leaks. Shadow Stacks are a fully precise mechanism for protecting backwards edges, and should be deployed with CFI mitigations. We present a comprehensive analysis of all possible shadow stack mechanisms along three axes: performance, compatibility, and security. For performance comparisons we use SPEC CPU2006, while security and compatibility are qualitatively analyzed. Based on our study, we renew calls for a shadow stack design that leverages a dedicated register, resulting in low performance overhead, and minimal memory overhead, but sacrifices compatibility. We present case studies of our implementation of such a design, Shadesmar, on Phoronix and Apache to demonstrate the feasibility of dedicating a general purpose register to a security monitor on modern architectures, and the deployability of Shadesmar. Our comprehensive analysis, including detailed case studies for our novel design, allows compiler designers and practitioners to select the correct shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201

    Attachment Styles Within the Coach-Athlete Dyad: Preliminary Investigation and Assessment Development

    Get PDF
    The present preliminary study aimed to develop and examine the psychometric properties of a new sport-specific self-report instrument designed to assess athletes’ and coaches’ attachment styles. The development and initial validation comprised three main phases. In Phase 1, a pool of items was generated based on pre-existing self-report attachment instruments, modified to reflect a coach and an athlete’s style of attachment. In Phase 2, the content validity of the items was assessed by a panel of experts. A final scale was developed and administered to 405 coaches and 298 athletes (N = 703 participants). In Phase 3, confirmatory factor analysis of the obtained data was conducted to determine the final items of the Coach-Athlete Attachment Scale (CAAS). Confirmatory factor analysis revealed acceptable goodness of fit indexes for a 3-first order factor model as well as a 2-first order factor model for both the athlete and the coach data, respectively. A secure attachment style positively predicted relationship satisfaction, while an insecure attachment style was a negative predictor of relationship satisfaction. The CAAS revealed initial psychometric properties of content, factorial, and predictive validity, as well as reliability

    Cruise Missile Integrated Air Defense System Penetration: Modeling the S-400 System

    Get PDF
    This research determines improved flight-path routes that make maximum utilization of terrain-masking opportunities, and defending radar and missile system equipment performance and launch timing constraints, in order to avoid radar detection and tracking, and to mitigate subsequent missile shoot-down risks. The problem is formulated as one of constrained optimization in three dimensions. Advantageous solutions are identified using the A* Algorithm in conjunction with detailed equipment performance and constraint calculations and high-resolution digital terrain elevation maps. Topographical features in digital terrain are exploited by the algorithm to avoid radar detection and tracking. The model includes provisions for all-aspect/all-frequency radar cross section variations, radar horizon masking, and specific factors relevant to the TLAM BGM-109 cruise missile and the Russian S-400 long-range and Pantsir point-defense IADS systems. Research conclusions indicate that intelligent exploitation of modeled system technical and performance capabilities and limitations yields improved survivability in conjunction with, and supplementing, terrain masking

    Attachment Styles Within the Coach-Athlete Dyad: Preliminary Investigation and Assessment Development

    Get PDF
    The present preliminary study aimed to develop and examine the psychometric properties of a new sport-specific self-report instrument designed to assess athletes’ and coaches’ attachment styles. The development and initial validation comprised three main phases. In Phase 1, a pool of items was generated based on pre-existing self-report attachment instruments, modified to reflect a coach and an athlete’s style of attachment. In Phase 2, the content validity of the items was assessed by a panel of experts. A final scale was developed and administered to 405 coaches and 298 athletes (N = 703 participants). In Phase 3, confirmatory factor analysis of the obtained data was conducted to determine the final items of the Coach-Athlete Attachment Scale (CAAS). Confirmatory factor analysis revealed acceptable goodness of fit indexes for a 3-first order factor model as well as a 2-first order factor model for both the athlete and the coach data, respectively. A secure attachment style positively predicted relationship satisfaction, while an insecure attachment style was a negative predictor of relationship satisfaction. The CAAS revealed initial psychometric properties of content, factorial, and predictive validity, as well as reliability
    • …
    corecore