Главная
Study mode:
on
1
Intro
2
Bottom Line Upfront
3
A Buffer Overflow
4
Control Flow Attack Example
5
Memory Corruption Attacks
6
Complete Memory Safety for C
7
CPI vs. Complete Memory Safety
8
How CPI Protects Pointers
9
CPI Underlying Assumptions
10
Info Leak without Memory Disclosure
11
Non-Crashing & Crashing Scenarios
12
Better Randomization
13
Conclusion
14
Thank You
Description:
Explore a critical analysis of Code Pointer Integrity (CPI) in this IEEE Symposium on Security & Privacy conference talk. Delve into the effectiveness of CPI as a defense mechanism against memory corruption attacks, examining its promise to balance security and performance. Learn about the implementation of CPI on different architectures and its reliance on information hiding. Discover the vulnerabilities of CPI's safe region when relying on information hiding, demonstrated through a proof-of-concept exploit against Nginx. Understand the importance of adequately protecting secrets in security mechanisms and the risks associated with relying on difficulty of guessing without ensuring the absence of memory leaks. Gain insights into memory corruption attacks, complete memory safety for C/C++, and the trade-offs between security and performance in defense mechanisms.

Missing the Point(er) - On the Effectiveness of Code Pointer Integrity

IEEE
Add to list
0:00 / 0:00