Automated exploitation of fully randomized executables

This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.

Bibliographic Details
Main Author: Gadient, Austin James.
Other Authors: Martin C. Rinard.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2020
Subjects:
Online Access:https://hdl.handle.net/1721.1/128401
_version_ 1826210677281259520
author Gadient, Austin James.
author2 Martin C. Rinard.
author_facet Martin C. Rinard.
Gadient, Austin James.
author_sort Gadient, Austin James.
collection MIT
description This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
first_indexed 2024-09-23T14:53:25Z
format Thesis
id mit-1721.1/128401
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T14:53:25Z
publishDate 2020
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1284012020-11-07T03:08:00Z Automated exploitation of fully randomized executables Gadient, Austin James. Martin C. Rinard. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Electrical Engineering and Computer Science. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, February, 2020 Cataloged from student-submitted PDF version of thesis. "February 2020." Includes bibliographical references (pages 73-75). Despite significant research into their remediation, memory corruption vulnerabilities remain a significant issue today. Attacks created to exploit these vulnerabilities are remarkably brittle due to their dependence on the presence of specific security settings, use of certain compiler toolchains, and the target's environment. I present Marten, a new end-to-end system for automatically discovering, exploiting, and combining information leakage and buffer overflow vulnerabilities to generate exploits that are robust against defenses, compilation decisions, and environment differences. Marten has generated four control flow hijacking exploits and three information leakage exploits. One of the information leakage exploits is generated against a previously undiscovered zero-day vulnerability in Serveez-0.2.2. CVE-2019-16200 has been assigned to this vulnerability. These results highlight Marten's ability to generate robust exploits that bypass modern defenses to download and execute injected code selected by an attacker. by Austin James Gadient. S.M. S.M. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science 2020-11-06T21:08:05Z 2020-11-06T21:08:05Z 2019 2020 Thesis https://hdl.handle.net/1721.1/128401 1203138667 eng MIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided. http://dspace.mit.edu/handle/1721.1/7582 75 pages application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Gadient, Austin James.
Automated exploitation of fully randomized executables
title Automated exploitation of fully randomized executables
title_full Automated exploitation of fully randomized executables
title_fullStr Automated exploitation of fully randomized executables
title_full_unstemmed Automated exploitation of fully randomized executables
title_short Automated exploitation of fully randomized executables
title_sort automated exploitation of fully randomized executables
topic Electrical Engineering and Computer Science.
url https://hdl.handle.net/1721.1/128401
work_keys_str_mv AT gadientaustinjames automatedexploitationoffullyrandomizedexecutables