YoVDO

Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Exploit Development Courses Vulnerability Analysis Courses

Course Description

Overview

Explore a cutting-edge technique for adapting remote exploits through automatic shellcode transplantation in this 19-minute IEEE conference talk. Delve into the challenges of developing remote exploits and learn how attackers can efficiently modify existing exploits by replacing the original shellcode. Discover ShellSwap, an innovative system that overcomes limitations of current automated shellcode placement methods using symbolic tracing, shellcode layout remediation, and path kneading. Examine the system's impressive 88% success rate in generating exploits across 100 test cases, combining 20 exploits with 5 independently developed shellcode pieces. Gain insights into the complexities of exploit development, defense mechanism bypassing, and the potential implications for cybersecurity.

Syllabus

Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube