Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A Tough Call - Mitigating Advanced Code-Reuse Attacks at the Binary Level

IEEE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for mitigating code-reuse attacks at the binary level in this 20-minute conference talk presented at the 2016 IEEE Symposium on Security & Privacy. Delve into the challenges of implementing Control-Flow Integrity (CFI) without source code and discover innovative binary-level analysis methods to reduce potential targets for indirect branches. Learn about the TypeArmor prototype, which reconstructs function prototypes and employs liveness analysis to create a more precise relationship between callsites and target callees. Examine experimental results demonstrating TypeArmor's efficiency and its effectiveness in mitigating advanced attacks like Counterfeit Object-oriented Programming (COOP). Gain insights into how strict binary-level CFI can enhance software security, even without access to source information or C++ semantics.

Syllabus

A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of A Tough Call - Mitigating Advanced Code-Reuse Attacks at the Binary Level

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.