Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Building Secure Defenses Against Code-Reuse AttacksBackground and Evolution of Code-Reuse Attacks

Building Secure Defenses Against Code-Reuse Attacks: Background and Evolution of Code-Reuse Attacks [In general, control-flow attacks allow an adversary to subvert the intended execution-flow of a program by exploiting a program error. For instance, a buffer overflow error can be exploited to write data beyond the boundaries of the buffer. As a consequence, an adversary can overwrite critical control-flow information which is located close to the buffer. Since control-flow information guide the program’s execution-flow, an adversary can thereby trigger malicious and unintended program actions such as installing a backdoor, injecting a malware, or accessing sensitive data.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Building Secure Defenses Against Code-Reuse AttacksBackground and Evolution of Code-Reuse Attacks

Loading next page...
 
/lp/springer-journals/building-secure-defenses-against-code-reuse-attacks-background-and-phGhtM2CgC
Publisher
Springer International Publishing
Copyright
© The Author(s) 2015
ISBN
978-3-319-25544-6
Pages
7 –25
DOI
10.1007/978-3-319-25546-0_2
Publisher site
See Chapter on Publisher Site

Abstract

[In general, control-flow attacks allow an adversary to subvert the intended execution-flow of a program by exploiting a program error. For instance, a buffer overflow error can be exploited to write data beyond the boundaries of the buffer. As a consequence, an adversary can overwrite critical control-flow information which is located close to the buffer. Since control-flow information guide the program’s execution-flow, an adversary can thereby trigger malicious and unintended program actions such as installing a backdoor, injecting a malware, or accessing sensitive data.]

Published: Dec 8, 2015

Keywords: Code-reuse Attacks; Control Flow Attacks; Return-oriented Programming; Shellcode; Stack Pointer

There are no references for this article.