DocumentCode :
3543182
Title :
Attacking x86 windows binaries by jump oriented programming
Author :
Erdodi, L.
Author_Institution :
Fac. of John von Neumann, Obuda Univ., Budapest, Hungary
fYear :
2013
fDate :
19-21 June 2013
Firstpage :
333
Lastpage :
338
Abstract :
Jump oriented programming is one of the most up-to-date form of the memory corruption attacks. During this kind of attack the attacker tries to achieve his goal by using library files linked to the binary, without the placing of any own code. To execute attacks like this, a dispatcher gadget is needed which does the control by reading from a given memory part the address of the subsequent command and manages its execution. Besides the dispatcher gadget also functional gadget is needed to implement an attack. Since the most widely used operation system is the Windows this study introduces the execution of jump oriented attacks by an example in Windows environment.
Keywords :
object-oriented programming; operating systems (computers); security of data; Windows environment; dispatcher gadget; functional gadget; jump oriented programming; library files; memory corruption attacks; x86 Windows binaries; Artificial intelligence; Conferences; Kernel; Libraries; Programming; Registers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Engineering Systems (INES), 2013 IEEE 17th International Conference on
Conference_Location :
San Jose
Print_ISBN :
978-1-4799-0828-8
Type :
conf
DOI :
10.1109/INES.2013.6632837
Filename :
6632837
Link To Document :
بازگشت