Current low-level exploits often rely on code-reuse, whereby short sections of code (gadgets) are chained together into a coherent exploit that can be executed without the need to inject any code. Several protection mechanisms attempt to eliminate this attack vector by applying code transformations to reduce the number of available gadgets. Nevertheless, it has emerged that the residual gadgets can still be sufficient to conduct a successful attack. Crucially, the lack of a common metric for “gadget quality” hinders the effective comparison of current mitigations. This work proposes four metrics that assign scores to a set of gadgets, measuring quality, usefulness, and practicality. We apply these metrics to binaries produced when compiling...
Speculative execution attacks, such as Spectre, reuse code from the victim’s binary to access and le...
Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scen...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
International audienceCurrent low-level exploits often rely on code-reuse, whereby short sections of...
Code-reuse attacks based on return oriented program-ming are among the most popular exploitation tec...
Code-reuse attacks based on return oriented programming are among the most popular exploitation tech...
Return-Oriented Programming (ROP) is the cornerstone of today’s exploits. Yet, building ROP chains i...
With the increased popularity of embedded devices, low-level programming languages like C and C++ ar...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
Hardware security is a fundamental and increasingly important contributor to the trustworthiness of ...
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often u...
The presence of instructions within executable programs is what makes the binaries executable. Howe...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Speculative execution attacks, such as Spectre, reuse code from the victim’s binary to access and le...
Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scen...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
International audienceCurrent low-level exploits often rely on code-reuse, whereby short sections of...
Code-reuse attacks based on return oriented program-ming are among the most popular exploitation tec...
Code-reuse attacks based on return oriented programming are among the most popular exploitation tech...
Return-Oriented Programming (ROP) is the cornerstone of today’s exploits. Yet, building ROP chains i...
With the increased popularity of embedded devices, low-level programming languages like C and C++ ar...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
Low-level exploitation is an ongoing security issue. History has shown multiple methods to gain cont...
Hardware security is a fundamental and increasingly important contributor to the trustworthiness of ...
When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often u...
The presence of instructions within executable programs is what makes the binaries executable. Howe...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
Computers today are ubiquitous and closely integrated into our everyday lives. But computers are fic...
Speculative execution attacks, such as Spectre, reuse code from the victim’s binary to access and le...
Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scen...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...