Completed
Policy 2: Chain of Short Sequences
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Beast is in Your Memory
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Outline
- 3 Motivation
- 4 Runtime Attacks
- 5 Return-Oriented Programming (ROP) - Basic Idea
- 6 ROP Adversary Model/Assumptions
- 7 ROP Attack Technique: Overview
- 8 ROP Attack History - Selected
- 9 CFI Implementation based on Labels
- 10 Original CFI Proposal: Cons & Pros
- 11 Solution Proposals: "Coarse-Grained CFI" Making of practical for real-world deployment
- 12 General Idea
- 13 Heuristics: Reducing False Negatives
- 14 "Coarse-Grained" CFI Proposals
- 15 Policy 1: Call-Preceded Return Address
- 16 Policy 2: Chain of Short Sequences
- 17 Contribution
- 18 Taking the Most Restrictive Setting in Coarse Grained CFI
- 19 Our Methodology and Workflow
- 20 Turing-Complete Gadget Set in kernel32.dll
- 21 Turing-Complete Gadget Set (contd.)
- 22 Long NOP Gadget
- 23 EMET'S ROP Mitigations
- 24 Related Attacks
- 25 Real-World Exploitation
- 26 Conclusion and Future Work