Title :
Attacking x86 windows binaries by jump oriented programming
Author_Institution :
Fac. of John von Neumann, Obuda Univ., Budapest, Hungary
Abstract :
Jump oriented programming is one of the most up-to-date form of the memory corruption attacks. During this kind of attack the attacker tries to achieve his goal by using library files linked to the binary, without the placing of any own code. To execute attacks like this, a dispatcher gadget is needed which does the control by reading from a given memory part the address of the subsequent command and manages its execution. Besides the dispatcher gadget also functional gadget is needed to implement an attack. Since the most widely used operation system is the Windows this study introduces the execution of jump oriented attacks by an example in Windows environment.
Keywords :
object-oriented programming; operating systems (computers); security of data; Windows environment; dispatcher gadget; functional gadget; jump oriented programming; library files; memory corruption attacks; x86 Windows binaries; Artificial intelligence; Conferences; Kernel; Libraries; Programming; Registers;
Conference_Titel :
Intelligent Engineering Systems (INES), 2013 IEEE 17th International Conference on
Conference_Location :
San Jose
Print_ISBN :
978-1-4799-0828-8
DOI :
10.1109/INES.2013.6632837