We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Memory corruption vulnerabilities, runtime mitigations and their bypasses

Formale Metadaten

Titel
Memory corruption vulnerabilities, runtime mitigations and their bypasses
Serientitel
Teil
11
Anzahl der Teile
29
Autor
Lizenz
CC-Namensnennung 3.0 Deutschland:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Memory corruption vulnerabilities are ubiquitous and unavoidable issues of our complex applications. There are many exploitation and exploit mitigation techniques offor them as well as bypass methods of for the used or proposed defenses. For instance beyond in addition to the nowadays classic defenses of Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR), there are newer more recent proposals like Control Flow Integrity (CFI) and fine-grained ASLR, even if these solutions are not frequently used in practice today mainly for performance and compatibility reasons. The aim of this talk is to provide an overview of the main achievements of the state -of -the -art academic research in this field, and also to demonstrate and discuss some concrete uses of evasion techniques for bypassing runtime mitigations, like the Enhanced Mitigation Experience Toolkit (EMET) of Microsoft.