Code Reuse Attacks can trick the CPU into performing some actions not originally intended by the running program. This is due to the fact that the execution can move anywhere within a process’s executable memory area, as well as the absence of policy checks when a transfer is performed. In our effort to defend against this type of attacks, in an earlier paper we present a Proof-of-Concept mitigation technique based on a modified Linux kernel where each library - either dynamically or statically linked - constitutes a separate code region. The idea behind this technique is to compartmentalize memory in order to control access to the different mem- ory segments, through a gate. Taking our previous work one step further, in this paper we prese...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Systems that enforce memory safety for today’s oper-ating system kernels and other system software d...
t is often useful for a code component (e.g., a library) to be able to maintain information that is ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Code-reuse attacks are software exploits in which an attacker directs control flow through existing ...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often u...
Abstract — Memory protection is a way to control memory access rights on an embedded system. The mai...
Code reuse attacks allow an adversary to impose malicious behavior on an otherwise benign program. T...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Modern operating systems use hardware support to protect against control flow hijacking attacks such...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Systems that enforce memory safety for today’s oper-ating system kernels and other system software d...
t is often useful for a code component (e.g., a library) to be able to maintain information that is ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Code-reuse attacks are software exploits in which an attacker directs control flow through existing ...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often u...
Abstract — Memory protection is a way to control memory access rights on an embedded system. The mai...
Code reuse attacks allow an adversary to impose malicious behavior on an otherwise benign program. T...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Modern operating systems use hardware support to protect against control flow hijacking attacks such...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Systems that enforce memory safety for today’s oper-ating system kernels and other system software d...