mitigating code reuse attacks with control flowing locking n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING PowerPoint Presentation
Download Presentation
MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING

Loading in 2 Seconds...

play fullscreen
1 / 6

MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING - PowerPoint PPT Presentation


  • 126 Views
  • Uploaded on

MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING. AUTHORS : TYLER BLETSCH XUXIAN JIANG VINCE FREEH. Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result. Solution – Control Flow Locking. Summary.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. MITIGATING CODE-REUSE ATTACKS WITH CONTROL-FLOWING LOCKING AUTHORS: TYLER BLETSCH XUXIAN JIANG VINCE FREEH Vishal Naidu

    2. Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with a malicious result. Solution – Control Flow Locking Summary Vishal Naidu

    3. Control Flow Locking enforces control flow integrity effectively mitigates the threat of code-reuse attacks at a reasonableperformance overhead. Appreciative Comment! Vishal Naidu

    4. The threat model does not state that the values of ‘value’ of ‘k’ are pre set or modified rather than the corresponding lock and unlock functions. Lock(value): if(k!=0) abort(); k=value; Unlock(value): if(k!=value) abort(); k=0; Critique! Vishal Naidu

    5. How small does the performance penalty have to be to be in order to deploy control flow locking in a real world scenario? Question? Vishal Naidu

    6. THANK YOU! Vishal Naidu