We present new techniques that allow a return-into-libc attack to be mounted on x86 executables that calls no functions at all. Our attack combines a large number of short instruction sequences to build gadgets that allow arbitrary computation. We show how to discover such instruction sequences by means of static analysis. We make use, in an essential way, of the properties of the x86 instruction set.
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Code-reuse attacks continue to evolve and remain a severe threat to modern software. Recent research...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
We show that on the x86 it is possible to mount a return-oriented programming attack without using a...
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programmi...
Abstract. Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. In this att...
This thesis investigates the pervasiveness and widespread applicability of "return-oriented programm...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
Unlike library code, whose instruction addresses can be randomized by address space layout randomiza...
Intrusion detection systems that monitor sequences of system calls have recently become more sophist...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
In 2005, Kruegel et al. proposed a variation of the traditional mimicry attack, to which we will ref...
Abstract—Since the day it was proposed, return-oriented programming has shown to be an effective and...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Code-reuse attacks continue to evolve and remain a severe threat to modern software. Recent research...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
We show that on the x86 it is possible to mount a return-oriented programming attack without using a...
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programmi...
Abstract. Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. In this att...
This thesis investigates the pervasiveness and widespread applicability of "return-oriented programm...
Abstract—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X...
Unlike library code, whose instruction addresses can be randomized by address space layout randomiza...
Intrusion detection systems that monitor sequences of system calls have recently become more sophist...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniqu...
In 2005, Kruegel et al. proposed a variation of the traditional mimicry attack, to which we will ref...
Abstract—Since the day it was proposed, return-oriented programming has shown to be an effective and...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Code-reuse attacks continue to evolve and remain a severe threat to modern software. Recent research...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...