2019
DOI: 10.15514/ispras-2019-31(6)-6
|View full text |Cite
|
Sign up to set email alerts
|

Survey of methods for automated code-reuse exploit generation.

Abstract: Аннотация. В работе приводится обзор существующих методов и инструментов автоматизированной генерации эксплойтов повторного использования кода. Такие эксплойты используют код, уже содержащийся в уязвимом приложении. Подход повторного использования кода (например, возвратно-ориентированное программирование) позволяет эксплуатировать уязвимости программного обеспечения при наличии защитного механизма операционной системы, который запрещает исполнение кода страниц памяти, помеченных в качестве данных. В статье да… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 53 publications
(142 reference statements)
0
3
0
Order By: Relevance
“…Classification does not guarantee that semantics hold for arbitrary input data. For the exact classification, formal verification must be performed [22]. We partially mitigate it by adding specific input data for corner cases [42] A. Gadget Preprocessing Gadget catalog does not represent gadgets that load multiple values from the stack to registers at once, e.g., pop rax ; pop rbx ; pop rdi ; ret 1 .…”
Section: Gadget Catalogingmentioning
confidence: 99%
See 2 more Smart Citations
“…Classification does not guarantee that semantics hold for arbitrary input data. For the exact classification, formal verification must be performed [22]. We partially mitigate it by adding specific input data for corner cases [42] A. Gadget Preprocessing Gadget catalog does not represent gadgets that load multiple values from the stack to registers at once, e.g., pop rax ; pop rbx ; pop rdi ; ret 1 .…”
Section: Gadget Catalogingmentioning
confidence: 99%
“…At first, code-reuse exploits were constructed manually, but this process gradually became automated with time. At the moment, the literature presents a set of approaches to automated code-reuse exploit construction [9][10][11][12][13][14][15][16][17][18][19][20][21][22]. The tools are even available for some of them [23][24][25][26][27][28][29].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation