Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks
Offered By: IEEE via YouTube
Course Description
Overview
Explore advanced cybersecurity concepts in this IEEE conference talk on undermining destructive code reads through code-inference attacks. Delve into the limitations of a defensive strategy that combines fine-grained address space layout randomization with the destruction of disclosed gadgets. Learn about novel attack tactics, including constructive reloads and code association via implicit reads, that render this mitigation ineffective. Examine concrete attack instantiations against popular applications and understand the cautionary implications for defensive approaches relying on in-place randomization. Gain insights into return-oriented programming, address space layout randomization (ASLR), just-in-time code reuse, and mitigation strategies for binary compatibility.
Syllabus
Intro
The Big Picture
Basics of Return-Oriented Programming
Basics of ASLR
Basics of Fine-grained ASLR
Basics of Just-in-Time Code Reuse
Mitigation Strategies
Challenges for Binary-Compatibility
No Execute After Read (NEAR)
Contributions
Undermining Destructive Reads
Take-aways
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera