Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium 2017
DOI: 10.1145/3150376.3150381
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Loader Oriented Programming on Linux

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Kirsch et al [64] showed that even with turned on protections, the dynamic loader (POSIX) leaves in the program writable pointers to the functions that are called when exiting the program. The attacker can overwrite these pointers so that malicious code is executed during the program exit.…”
Section: Returning To Randomized Library Attackmentioning
confidence: 99%
“…Kirsch et al [64] showed that even with turned on protections, the dynamic loader (POSIX) leaves in the program writable pointers to the functions that are called when exiting the program. The attacker can overwrite these pointers so that malicious code is executed during the program exit.…”
Section: Returning To Randomized Library Attackmentioning
confidence: 99%