Overview
Syllabus
Intro
Motivation
Three Decades of Runtime Exploits
Return-oriented Programming (ROP): Basic Idea
ROP Attack Technique: Overview
Adversary Model/Assumptions
MAIN DEFENSES MEASURES
Randomization vs. CFI
Fine-Grained ASLR
Key Insight and Observation
Gadget Finding and Payload Generation
Code Randomization: Attack & Defense Techniques
Readactor: Resilience to Memory Disclosure
Preventing Direct Memory Disclosure
Execute-Only EPT Mapping
Indirect Memory Disclosure Attack
Code-Pointer Hiding
Readactor Compiler
Readactor's Runtime Architecture
JIT Compiler Support
Evaluation: Does it work?
SPEC CPU2006 Performance
How About Security?
Vtable Randomization
Conclusion
Coming Soon
Taught by
Black Hat