Главная
Study mode:
on
1
Intro
2
Outline
3
Motivation
4
Runtime Attacks
5
Return-Oriented Programming (ROP) - Basic Idea
6
ROP Adversary Model/Assumptions
7
ROP Attack Technique: Overview
8
ROP Attack History - Selected
9
CFI Implementation based on Labels
10
Original CFI Proposal: Cons & Pros
11
Solution Proposals: "Coarse-Grained CFI" Making of practical for real-world deployment
12
General Idea
13
Heuristics: Reducing False Negatives
14
"Coarse-Grained" CFI Proposals
15
Policy 1: Call-Preceded Return Address
16
Policy 2: Chain of Short Sequences
17
Contribution
18
Taking the Most Restrictive Setting in Coarse Grained CFI
19
Our Methodology and Workflow
20
Turing-Complete Gadget Set in kernel32.dll
21
Turing-Complete Gadget Set (contd.)
22
Long NOP Gadget
23
EMET'S ROP Mitigations
24
Related Attacks
25
Real-World Exploitation
26
Conclusion and Future Work
Description:
Explore advanced techniques for bypassing modern control-flow integrity (CFI) mechanisms in this Black Hat conference talk. Delve into a comprehensive analysis of recently proposed CFI solutions, including kBouncer, ROPGuard, ROPecker, and CFI for COTS binaries. Learn how to transform existing exploits against Windows into stealthy attacks that evade detection by Windows EMET and other CFI techniques. Discover how a 1MB Windows library (kernel32.dll) can be leveraged to derive a Turing-complete gadget set using only call-preceded gadgets. Gain insights into runtime attacks, Return-Oriented Programming (ROP), and the evolution of CFI implementations. Examine the limitations of coarse-grained CFI proposals and understand the methodology for creating more sophisticated exploits. Conclude with a discussion on real-world exploitation techniques and future directions in CFI research.

The Beast is in Your Memory

Black Hat
Add to list