YoVDO

A Tough Call - Mitigating Advanced Code-Reuse Attacks at the Binary Level

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Control-Flow Integrity Courses

Course Description

Overview

Explore advanced techniques for mitigating code-reuse attacks at the binary level in this 20-minute conference talk presented at the 2016 IEEE Symposium on Security & Privacy. Delve into the challenges of implementing Control-Flow Integrity (CFI) without source code and discover innovative binary-level analysis methods to reduce potential targets for indirect branches. Learn about the TypeArmor prototype, which reconstructs function prototypes and employs liveness analysis to create a more precise relationship between callsites and target callees. Examine experimental results demonstrating TypeArmor's efficiency and its effectiveness in mitigating advanced attacks like Counterfeit Object-oriented Programming (COOP). Gain insights into how strict binary-level CFI can enhance software security, even without access to source information or C++ semantics.

Syllabus

A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network