Analysis of return oriented programming and countermeasures
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/115035 |
_version_ | 1811090225876697088 |
---|---|
author | Soderstrom, Eric K |
author2 | Martin Rinard and Hamed Okhravi. |
author_facet | Martin Rinard and Hamed Okhravi. Soderstrom, Eric K |
author_sort | Soderstrom, Eric K |
collection | MIT |
description | Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014. |
first_indexed | 2024-09-23T14:38:59Z |
format | Thesis |
id | mit-1721.1/115035 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T14:38:59Z |
publishDate | 2018 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1150352019-04-12T20:11:59Z Analysis of return oriented programming and countermeasures Soderstrom, Eric K Martin Rinard and Hamed Okhravi. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014. Missing pages 3 and 4 (abstract). Cataloged from student-submitted PDF version of thesis. Includes bibliographical references (pages 63-65). Introduction: Attackers have relatively success in defeating modern defensive techniques by using an exploitation method known as "code reuse." This class of exploitation techniques makes use of the lack of memory safety in C which allows an attacker to redirect a program's control flow to pre-existing snippets of code. Code reuse attacks have historically been a powerful and ubiquitous exploitation technique [2]. Even as recently as 2014 there has been an outbreak of these code reuse attacks, targeting such applications as Adobe, Internet Explorer, and Firefox 15]. Many defensive countermeasures have been taken by the security community, ranging from data execution prevention to varying degrees of code randomization. This thesis can roughly be broken into two halves: 1. Show how code reuse attacks can leverage timing information in order to break many existing defenses. 2. Investigate how control flow integrity can be improved upon as a countermeasure to code reuse attacks ... by Eric K. Soderstrom. M. Eng. 2018-04-27T18:11:00Z 2018-04-27T18:11:00Z 2014 2014 Thesis http://hdl.handle.net/1721.1/115035 1031984780 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 65 pages application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Soderstrom, Eric K Analysis of return oriented programming and countermeasures |
title | Analysis of return oriented programming and countermeasures |
title_full | Analysis of return oriented programming and countermeasures |
title_fullStr | Analysis of return oriented programming and countermeasures |
title_full_unstemmed | Analysis of return oriented programming and countermeasures |
title_short | Analysis of return oriented programming and countermeasures |
title_sort | analysis of return oriented programming and countermeasures |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/115035 |
work_keys_str_mv | AT soderstromerick analysisofreturnorientedprogrammingandcountermeasures |