Loading...
Please wait, while we are loading the content...
Similar Documents
Attacking x86 windows binaries by jump oriented programming
| Content Provider | Semantic Scholar |
|---|---|
| Author | Erdodi, L. |
| Copyright Year | 2013 |
| Abstract | Jump oriented programming is one of the most up-to-date form of the memory corruption attacks. During this kind of attack the attacker tries to achieve his goal by using library files linked to the binary, without the placing of any own code. To execute attacks like this, a dispatcher gadget is needed which does the control by reading from a given memory part the address of the subsequent command and manages its execution. Besides the dispatcher gadget also functional gadget is needed to implement an attack. Since the most widely used operation system is the Windows this study introduces the execution of jump oriented attacks by an example in Windows environment. |
| Starting Page | 333 |
| Ending Page | 338 |
| Page Count | 6 |
| File Format | PDF HTM / HTML |
| DOI | 10.1109/ines.2013.6632837 |
| Alternate Webpage(s) | http://www.uni-obuda.hu/users/szakala/INES%202013%20pendrive/61_ines2013.pdf |
| Alternate Webpage(s) | https://doi.org/10.1109/ines.2013.6632837 |
| Journal | 2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES) |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |