Skip to main content

Showing 1–2 of 2 results for author: Follner, A

.
  1. arXiv:1605.08159  [pdf, ps, other

    cs.SE cs.CR

    Analyzing the Gadgets Towards a Metric to Measure Gadget Quality

    Authors: Andreas Follner, Alexandre Bartel, Eric Bodden

    Abstract: Current low-level exploits often rely on code-reuse, whereby short sections of code (gadgets) are chained together into a coherent exploit that can be executed without the need to inject any code. Several protection mechanisms attempt to eliminate this attack vector by applying code transformations to reduce the number of available gadgets. Nevertheless, it has emerged that the residual gadgets ca… ▽ More

    Submitted 26 May, 2016; originally announced May 2016.

    Comments: International Symposium on Engineering Secure Software and Systems, Apr 2016, London, United Kingdom

  2. arXiv:1504.02288  [pdf, ps, other

    cs.CR

    ROPocop - Dynamic Mitigation of Code-Reuse Attacks

    Authors: Andreas Follner, Eric Bodden

    Abstract: Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques, but nevertheless, new exploits that successfully bypass these technologies still appear on a regular basis. In this paper, we propose ROPocop, a novel approach for detec… ▽ More

    Submitted 9 April, 2015; originally announced April 2015.