As VTable hijacking becomes the primary mode of ex-ploitation against modern browsers, protecting said VTa-bles has recently become a prime research interest. While multiple source- and binary-based solutions for protect-ing VTables have been proposed already, we found that in practice they are too conservative, which allows de-termined attackers to circumvent them. In this paper we delve into the design of C++ VTables and match that knowledge against the now industry standard pro-tection scheme of VTV. We propose an end-to-end de-sign that significantly refines VTV, to offer a provably optimal protection scheme. As we build on top of VTV, we preserve all of its advantages in terms of software compatibility and overhead. Thus, our proposed ...
A growing trend in repackaging attacks exploits the Android virtualization technique, in which malic...
As systems become larger and more complex, the need to optimise the infrastructure in favour of reli...
Over the last few years, exploit kits have been increasingly used for system compromise and malware ...
As VTable hijacking becomes the primary mode of ex-ploitation against modern browsers, protecting sa...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
Web browsers are one of the most used, complex and popular software systems nowadays. They are prone...
Abstract—Several defenses have increased the cost of tradi-tional, low-level attacks that corrupt co...
Polymorphism and inheritance make C++ suitable for writing complex software, but significantly incre...
Web sites, web browsers, web site authors, web component authors, and end users interact in a compli...
© 2017 Association for Computing Machinery. We present, Vip, an approach to boosting the precision o...
Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce...
Web browsers are one of the most security-critical applications that billions of people use to acces...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
The widely popular browser extensions now become one of the most commonly used malware attack vector...
A growing trend in repackaging attacks exploits the Android virtualization technique, in which malic...
As systems become larger and more complex, the need to optimise the infrastructure in favour of reli...
Over the last few years, exploit kits have been increasingly used for system compromise and malware ...
As VTable hijacking becomes the primary mode of ex-ploitation against modern browsers, protecting sa...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
Web browsers are one of the most used, complex and popular software systems nowadays. They are prone...
Abstract—Several defenses have increased the cost of tradi-tional, low-level attacks that corrupt co...
Polymorphism and inheritance make C++ suitable for writing complex software, but significantly incre...
Web sites, web browsers, web site authors, web component authors, and end users interact in a compli...
© 2017 Association for Computing Machinery. We present, Vip, an approach to boosting the precision o...
Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce...
Web browsers are one of the most security-critical applications that billions of people use to acces...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
The widely popular browser extensions now become one of the most commonly used malware attack vector...
A growing trend in repackaging attacks exploits the Android virtualization technique, in which malic...
As systems become larger and more complex, the need to optimise the infrastructure in favour of reli...
Over the last few years, exploit kits have been increasingly used for system compromise and malware ...