Matches in SemOpenAlex for { <https://semopenalex.org/work/W2765256768> ?p ?o ?g. }
Showing items 1 to 39 of
39
with 100 items per page.
- W2765256768 abstract "Memory-corruption vulnerabilities pose a severe threat on modern systems security. Although this problem is known for almost three decades it is unlikely to be solved in the near future because a large amount of modern software is still programmed in unsafe, legacy languages such as C/C++. With new vulnerabilities in popular software discovered almost every day, and with high third party demand for (purchasing) the corresponding exploits, runtime attacks are more prevalent than ever.Even perfect cryptography can easily be undermined by exploiting software vulnerabilities. Typically, one vulnerability in wide-spread software (e.g., Tor Browser) is sufficient for the adversary to compromise all users. Moving target approaches such as software diversity [2] and system randomization techniques [7] are considered to be effective and practical means to strongly reduce the scale of such attacks because ideally, the adversary would require to craft a unique exploit per user. However, recently it was shown that existing software-randomization schemes can be circumvented by practical exploitation techniques such as Just-In-Time Return Oriented Programming (JIT-ROP) that takes advantage of information leakage [1]. The attack demonstrated that even a single disclosed code pointer can be exploited to defeat any (fine-grained) code randomization scheme. Later, it was shown that there are various sources of information leakage that can be exploited such as virtual function pointers [4]. JIT-ROP motivated a number of subsequent works to prevent the adversary from reading code such as Readactor [3,5], or ASLR Guard [8]. For instance, Readactor and its successor Readactor++ [3,5] use various techniques to prevent direct and indirect code disclosure, which seems to be non-trivial in general [6]. The arms race will continue." @default.
- W2765256768 created "2017-11-10" @default.
- W2765256768 creator A5010183779 @default.
- W2765256768 date "2017-10-30" @default.
- W2765256768 modified "2023-10-04" @default.
- W2765256768 title "Moving Targets vs. Moving Adversaries" @default.
- W2765256768 cites W1605557845 @default.
- W2765256768 cites W1963947298 @default.
- W2765256768 cites W1992741024 @default.
- W2765256768 cites W2022413220 @default.
- W2765256768 cites W2033593513 @default.
- W2765256768 cites W2081105932 @default.
- W2765256768 cites W2612403404 @default.
- W2765256768 doi "https://doi.org/10.1145/3140549.3140564" @default.
- W2765256768 hasPublicationYear "2017" @default.
- W2765256768 type Work @default.
- W2765256768 sameAs 2765256768 @default.
- W2765256768 citedByCount "0" @default.
- W2765256768 crossrefType "proceedings-article" @default.
- W2765256768 hasAuthorship W2765256768A5010183779 @default.
- W2765256768 hasConcept C41008148 @default.
- W2765256768 hasConceptScore W2765256768C41008148 @default.
- W2765256768 hasLocation W27652567681 @default.
- W2765256768 hasOpenAccess W2765256768 @default.
- W2765256768 hasPrimaryLocation W27652567681 @default.
- W2765256768 hasRelatedWork W2093578348 @default.
- W2765256768 hasRelatedWork W2130043461 @default.
- W2765256768 hasRelatedWork W2350741829 @default.
- W2765256768 hasRelatedWork W2358668433 @default.
- W2765256768 hasRelatedWork W2376932109 @default.
- W2765256768 hasRelatedWork W2382290278 @default.
- W2765256768 hasRelatedWork W2390279801 @default.
- W2765256768 hasRelatedWork W2748952813 @default.
- W2765256768 hasRelatedWork W2899084033 @default.
- W2765256768 hasRelatedWork W3004735627 @default.
- W2765256768 isParatext "false" @default.
- W2765256768 isRetracted "false" @default.
- W2765256768 magId "2765256768" @default.
- W2765256768 workType "article" @default.