International audienceJavaScript (JS) engines are virtual machines that execute JavaScript code. These engines find frequent application in web browsers like Google Chrome, Mozilla Firefox, Microsoft Internet Explorer and Apple Safari. Since, the purpose of a JS engine is to produce executable code, it cannot be run in a non-executable environment, and is susceptible to attacks like Just-in-Time (JIT) Spraying, which embed return-oriented programming (ROP) gadgets in arithmetic or logical instructions as immediate offsets. This paper introduces libmask, a JIT compiler extension to prevent the JIT-spraying attacks as an effective alternative to XOR based constant blinding. libmask transforms constants into global variables and marks the memo...
Memory-corruption vulnerabilities pose a serious threat to modern computer security. Attackers explo...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Abstract—In the face of widespread DEP and ASLR deploy-ment, JIT spraying brings together the best o...
International audienceJavaScript (JS) engines are virtual machines that execute JavaScript code. The...
Modern browsers such as Chrome and Edge deploy constant blinding to remove attacker-controlled ...
Just-in-Time compilers offer substantial runtime performance benefits over traditional execution met...
Just-in-time (JIT)-spraying, which first appeared in Blackhat DC 2010, is a new kind of attack techn...
Modern JavaScript engines that power websites and even full applications on the Web are driven by th...
Abstract—Return-oriented programming (ROP) has become the dominant form of vulnerability exploitatio...
Part 5: Software SecurityInternational audienceJIT spraying is a new code-reuse technique to attack ...
Web browsers are one of the most important enduser applications to browse, retrieve, and present Int...
Web browsers that support a safe language such as Javascript are becoming a platform of great intere...
Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce...
Abstract Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP)...
Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP) is still...
Memory-corruption vulnerabilities pose a serious threat to modern computer security. Attackers explo...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Abstract—In the face of widespread DEP and ASLR deploy-ment, JIT spraying brings together the best o...
International audienceJavaScript (JS) engines are virtual machines that execute JavaScript code. The...
Modern browsers such as Chrome and Edge deploy constant blinding to remove attacker-controlled ...
Just-in-Time compilers offer substantial runtime performance benefits over traditional execution met...
Just-in-time (JIT)-spraying, which first appeared in Blackhat DC 2010, is a new kind of attack techn...
Modern JavaScript engines that power websites and even full applications on the Web are driven by th...
Abstract—Return-oriented programming (ROP) has become the dominant form of vulnerability exploitatio...
Part 5: Software SecurityInternational audienceJIT spraying is a new code-reuse technique to attack ...
Web browsers are one of the most important enduser applications to browse, retrieve, and present Int...
Web browsers that support a safe language such as Javascript are becoming a platform of great intere...
Exploit development is an arm race between attackers and defenders. In this thesis, I will introduce...
Abstract Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP)...
Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP) is still...
Memory-corruption vulnerabilities pose a serious threat to modern computer security. Attackers explo...
Detecting and preventing exploitation of memory corruption vulnerabilities is highly challenging. Un...
Abstract—In the face of widespread DEP and ASLR deploy-ment, JIT spraying brings together the best o...