YoVDO

Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks

Offered By: IEEE via YouTube

Tags

Return-oriented Programming Courses Cybersecurity Courses

Course Description

Overview

Explore advanced cybersecurity concepts in this IEEE conference talk on undermining destructive code reads through code-inference attacks. Delve into the limitations of a defensive strategy that combines fine-grained address space layout randomization with the destruction of disclosed gadgets. Learn about novel attack tactics, including constructive reloads and code association via implicit reads, that render this mitigation ineffective. Examine concrete attack instantiations against popular applications and understand the cautionary implications for defensive approaches relying on in-place randomization. Gain insights into return-oriented programming, address space layout randomization (ASLR), just-in-time code reuse, and mitigation strategies for binary compatibility.

Syllabus

Intro
The Big Picture
Basics of Return-Oriented Programming
Basics of ASLR
Basics of Fine-grained ASLR
Basics of Just-in-Time Code Reuse
Mitigation Strategies
Challenges for Binary-Compatibility
No Execute After Read (NEAR)
Contributions
Undermining Destructive Reads
Take-aways


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera