Главная
Study mode:
on
1
Intro
2
The Big Picture
3
Basics of Return-Oriented Programming
4
Basics of ASLR
5
Basics of Fine-grained ASLR
6
Basics of Just-in-Time Code Reuse
7
Mitigation Strategies
8
Challenges for Binary-Compatibility
9
No Execute After Read (NEAR)
10
Contributions
11
Undermining Destructive Reads
12
Take-aways
Description:
Explore advanced cybersecurity concepts in this IEEE conference talk on undermining destructive code reads through code-inference attacks. Delve into the limitations of a defensive strategy that combines fine-grained address space layout randomization with the destruction of disclosed gadgets. Learn about novel attack tactics, including constructive reloads and code association via implicit reads, that render this mitigation ineffective. Examine concrete attack instantiations against popular applications and understand the cautionary implications for defensive approaches relying on in-place randomization. Gain insights into return-oriented programming, address space layout randomization (ASLR), just-in-time code reuse, and mitigation strategies for binary compatibility.

Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks

IEEE
Add to list
0:00 / 0:00