Evaluation data of the published paper: "VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching". The paper was published at the Annual Computer Security Applications Conference (ACSAC) 2019. The paper is available at: https://www.syssec.ruhr-uni-bochum.de/research/publications/VPS/ Abstract Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers can potentially hijack and in practice, vtable hijacking is one of the most important attack vector for C+...
Research has shown that microprocessors and structures of the microprocessors are vulnerable to alph...
International audienceRIOT is a micro-kernel dedicated to IoT applications that adopts eBPF (extende...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
Polymorphism and inheritance make C++ suitable for writing complex software, but significantly incre...
© 2017 Association for Computing Machinery. We present, Vip, an approach to boosting the precision o...
We present, Vip, an approach to boosting the precision of Virtual call Integrity Protection for larg...
Abstract—Several defenses have increased the cost of tradi-tional, low-level attacks that corrupt co...
Web browsers are one of the most used, complex and popular software systems nowadays. They are prone...
International audienceIn his keynote speech at CHES 2004, Kocher advocated that side-channel attacks...
C++ and Microsoft's Component Object Model (COM) are examples of a high- level lan- guage and develo...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
Contemporary CPU architectures conflate virtualization and protection, imposing virtualization-rela...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Research has shown that microprocessors and structures of the microprocessors are vulnerable to alph...
International audienceRIOT is a micro-kernel dedicated to IoT applications that adopts eBPF (extende...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...
Polymorphism and inheritance make C++ suitable for writing complex software, but significantly incre...
© 2017 Association for Computing Machinery. We present, Vip, an approach to boosting the precision o...
We present, Vip, an approach to boosting the precision of Virtual call Integrity Protection for larg...
Abstract—Several defenses have increased the cost of tradi-tional, low-level attacks that corrupt co...
Web browsers are one of the most used, complex and popular software systems nowadays. They are prone...
International audienceIn his keynote speech at CHES 2004, Kocher advocated that side-channel attacks...
C++ and Microsoft's Component Object Model (COM) are examples of a high- level lan- guage and develo...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
VTable hijacking has lately been promoted to the de facto technique for exploiting C++ applications,...
Contemporary CPU architectures conflate virtualization and protection, imposing virtualization-rela...
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
Research has shown that microprocessors and structures of the microprocessors are vulnerable to alph...
International audienceRIOT is a micro-kernel dedicated to IoT applications that adopts eBPF (extende...
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflo...