The Beast is in Your Memory

The Beast is in Your Memory

Black Hat via YouTube Direct link

Related Attacks

24 of 26

24 of 26

Related Attacks

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Beast is in Your Memory

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Motivation
  4. 4 Runtime Attacks
  5. 5 Return-Oriented Programming (ROP) - Basic Idea
  6. 6 ROP Adversary Model/Assumptions
  7. 7 ROP Attack Technique: Overview
  8. 8 ROP Attack History - Selected
  9. 9 CFI Implementation based on Labels
  10. 10 Original CFI Proposal: Cons & Pros
  11. 11 Solution Proposals: "Coarse-Grained CFI" Making of practical for real-world deployment
  12. 12 General Idea
  13. 13 Heuristics: Reducing False Negatives
  14. 14 "Coarse-Grained" CFI Proposals
  15. 15 Policy 1: Call-Preceded Return Address
  16. 16 Policy 2: Chain of Short Sequences
  17. 17 Contribution
  18. 18 Taking the Most Restrictive Setting in Coarse Grained CFI
  19. 19 Our Methodology and Workflow
  20. 20 Turing-Complete Gadget Set in kernel32.dll
  21. 21 Turing-Complete Gadget Set (contd.)
  22. 22 Long NOP Gadget
  23. 23 EMET'S ROP Mitigations
  24. 24 Related Attacks
  25. 25 Real-World Exploitation
  26. 26 Conclusion and Future Work

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.