All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated code for exception handling support. The data structures describe the call stack frame layout in the DWARF format bytecode. The dedicated code includes an interpreter of this bytecode and logic to implement the call stack unwinding. Despite being present in a large class of programs -- and therefore potentially providing a huge attack surface -- this mechanism is not widely known or studied. Of particular interest to us is that the exception handling mechanism provides the means for fundamentally altering the flow of a program. DWARF is designed specifically for calculating call frame addresses and register values. DWARF expressions are Turi...
Software exploitation has been proven to be a lucrative business for cybercriminals. Unfortunately, ...
In this project we study the effects of undefined behavior in open source software and its ability t...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
The study of vulnerabilities and exploitation is one of finding mechanisms affecting the flow of com...
The study of vulnerabilities and exploitation is one of finding mechanisms affecting the flow of com...
Debug information, usually encoded in the DWARF format, is a hidden and obscure component of our com...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by att...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
This dissertation addresses the problem of automatic exploit generation for heap based buffer overfl...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Computers are often subject to external attacks that aim to control software behavior. Typically, su...
Software exploitation has been proven to be a lucrative business for cybercriminals. Unfortunately, ...
In this project we study the effects of undefined behavior in open source software and its ability t...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
The study of vulnerabilities and exploitation is one of finding mechanisms affecting the flow of com...
The study of vulnerabilities and exploitation is one of finding mechanisms affecting the flow of com...
Debug information, usually encoded in the DWARF format, is a hidden and obscure component of our com...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by att...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
This dissertation addresses the problem of automatic exploit generation for heap based buffer overfl...
Ensuring the security and integrity of computer systems deployed on the Internet is growing harder. ...
Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona...
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain ar...
Computers are often subject to external attacks that aim to control software behavior. Typically, su...
Software exploitation has been proven to be a lucrative business for cybercriminals. Unfortunately, ...
In this project we study the effects of undefined behavior in open source software and its ability t...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for indu...