We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Memory corruption vulnerabilities, runtime mitigations and their bypasses

Formal Metadata

Title
Memory corruption vulnerabilities, runtime mitigations and their bypasses
Title of Series
Part Number
11
Number of Parts
29
Author
License
CC Attribution 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Memory corruption vulnerabilities are ubiquitous and unavoidable issues of our complex applications. There are many exploitation and exploit mitigation techniques offor them as well as bypass methods of for the used or proposed defenses. For instance beyond in addition to the nowadays classic defenses of Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR), there are newer more recent proposals like Control Flow Integrity (CFI) and fine-grained ASLR, even if these solutions are not frequently used in practice today mainly for performance and compatibility reasons. The aim of this talk is to provide an overview of the main achievements of the state -of -the -art academic research in this field, and also to demonstrate and discuss some concrete uses of evasion techniques for bypassing runtime mitigations, like the Enhanced Mitigation Experience Toolkit (EMET) of Microsoft.