Attack Jop

References:

More

  • Jujutsu
  • References: [1] Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. CCS, 2015. A new attack on fine-grained CF that exploit the incompleteness of pointer analysis, when combined with common software engineering practices, to enable an attacker to execute arbitrary malicious code. Concepts: ICS: Indirect Call Site ACICS: Argument Corruptible Indirect Call Site RCE: Remote Code Execution DSA: Data Structure Analysis DEP: Data Execution Prevention ASLR: Address Space Layout Randomization SSP: Stack Smashing Protection ROP: Return-oriented Programming JOP: Jump-Oriented Programming Threat Model The threat model in this paper is a remote attacker trying to hijack control of a machine by exploiting memory vulnerabilities.

Created Jul 8, 2022 // Last Updated Jul 8, 2022

If you could revise
the fundmental principles of
computer system design
to improve security...

... what would you change?