Memory corruptions are still the most prominent venue to attack otherwise secure programs. In order to make exploitation of software bugs more difficult, defenders introduced a vast number of post corruption security mitigations, such as w⊕x memory, Stack Canaries, and Address Space Layout Randomization (ASLR), to only name a few. In the following, we describe the Wiedergänger1-Attack, a new attack vector that reliably allows to escalate unbounded array access vulnerabilities occurring in specifically allocated memory regions to full code execution on programs running on i386/x86 64 Linux. Wiedergänger-attacks abuse determinism in Linux ASLR implementation combined with the fact that (even with protection mechanisms such as relro and glibc'...
Heap-based attacks depend on a combination of memory manage-ment errors and an exploitable memory al...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Abstract—Memory corruption bugs in software written in low-level languages like C or C++ are one of ...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
A longstanding issue in computer security is preventing an attacker from gaining arbitrary execution...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Heap-based attacks depend on a combination of memory manage-ment errors and an exploitable memory al...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Abstract—Memory corruption bugs in software written in low-level languages like C or C++ are one of ...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. Whil...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
Data-oriented exploits are growing in popularity as defenders are closing attack vectorsrelated to c...
A longstanding issue in computer security is preventing an attacker from gaining arbitrary execution...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
Heap-based attacks depend on a combination of memory manage-ment errors and an exploitable memory al...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
Abstract—Memory corruption bugs in software written in low-level languages like C or C++ are one of ...