Главная
Study mode:
on
1
Intro
2
Adversary Model / Assumptions
3
Disclosure of Randomized Code
4
Code Disclosure
5
Preventing Direct Disclosure
6
Execute-Only EPT Mapping
7
Indirect Disclosure Attack
8
Code-Pointer Hiding
9
Readactor Compiler
10
Runtime Architecture
11
JIT Compiler Support
12
Evaluation
13
SPEC CPU2006
14
Conclusion
Description:
Explore a groundbreaking defense against code-reuse attacks in this IEEE Symposium on Security & Privacy conference talk. Delve into Readactor, the first practical, fine-grained code randomization defense resilient to both static and dynamic return-oriented programming (ROP) attacks. Learn how this innovative approach addresses direct and indirect memory disclosure vulnerabilities, protects statically and dynamically generated code, and utilizes hardware features for execute-only memory. Discover the compiler-based code generation paradigm that hides code pointers from potential adversaries. Examine the implementation of Readactor in the Google Chromium browser and its V8 JIT compiler, and explore its efficiency with an average SPEC CPU2006 performance overhead of only 6.4%.

Readactor: Practical Code Randomization Resilient to Memory Disclosure

IEEE
Add to list