Главная
Study mode:
on
1
Control Attacks are Getting Harder
2
Contributions
3
Motivating Example (cont.)
4
Data-Oriented Programming (DOP) . General construction
5
Data-Oriented Gadgets
6
Gadget Dispatcher
7
Attack Construction
8
Evaluation - Feasibility
9
Case Study: Bypassing Randomization
10
dlopend - Dynamic Linking Interface
11
Case Study: Simulating A Network Bot
12
Case Study: Altering Memory Permissions
13
Related Work
14
Potential Defenses
15
Motivatine Example
Description:
Explore the concept of Data-Oriented Programming (DOP) and its implications for non-control data attacks in this 20-minute IEEE conference talk. Delve into the Turing-complete nature of these exploits and learn about a systematic technique for constructing expressive non-control data attacks on x86 programs. Examine the findings from an experimental evaluation of 9 programs, revealing thousands of data-oriented x86 gadgets and gadget dispatchers. Discover how 8 out of 9 real-world programs contain gadgets capable of simulating arbitrary computations, with 2 confirmed to enable Turing-complete attacks. Investigate three end-to-end attack scenarios that bypass randomization defenses, operate network bots, and alter memory permissions, all while evading ASLR and DEP protections. Gain insights into the significant power DOP grants attackers and consider potential defense strategies against these sophisticated exploits.

Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks

IEEE
Add to list