A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
You Can Run but You Can't Read
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
Code reuse attacks allow an adversary to impose malicious behavior on an otherwise benign program. To mitigate such attacks, a common approach is to disguise the address or content of code snippets by means of randomization or rewriting, leaving the adversary with no choice but guessing. However, disclosure attacks allow an adversary to scan a processeven remotely-and enable her to read executable memory on-the-fly, thereby allowing the just-in-time assembly of exploits on the target site. In
doi:10.1145/2660267.2660378
dblp:conf/ccs/BackesHKKNP14
fatcat:itz47sha3zgkdasqqxn4qhnylu