Hardware security features need to strike a careful balance between design intrusiveness and completeness of methods. Securing against attacks like Return Oriented Programming (ROP) requires frequent and expensive checks. Complete security defenses have been proposed yet modern systems are still vulnerable to ROP attacks. We provide complete security by decomposing the solution into two stages. The first stage raises alarms based on an imprecise, low cost hardware detector. The second stage applies complete methods in order to accurately distinguish real attacks from false alarms. This decomposition is enabled with Record and Deterministic Replay. The original execution is recorded and subjected to replay analysis as alarms are raised. In t...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer sys...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer sys...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Virtualization technology has enabled powerful security monitoring techniques, such as virtual machi...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...