dc.contributor.author | Gadient, Austin | |
dc.contributor.author | Ortiz, Baltazar | |
dc.contributor.author | Barrato, Ricardo | |
dc.contributor.author | Davis, Eli | |
dc.contributor.author | Perkins, Jeff | |
dc.contributor.author | Rinard, Martin | |
dc.date.accessioned | 2019-06-11T13:45:02Z | |
dc.date.available | 2019-06-11T13:45:02Z | |
dc.date.issued | 2019-06-11 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/121246 | |
dc.description | We present an automated system, Marten, that automatically generates control flow hijacking exploits against fully randomized executables by combining information leakage and buffer overflow exploits. | en_US |
dc.description.abstract | We present Marten, a new end to end system for automatically discovering, exploiting, and combining information leakage and buffer overflow vulnerabilities to derandomize and exploit remote, fully randomized processes. Results from two case studies high- light Marten’s ability to generate short, robust ROP chain exploits that bypass address space layout randomization and other modern defenses to download and execute injected code selected by an attacker. | en_US |
dc.description.sponsorship | DARPA Grant HR001118C0059 | en_US |
dc.language.iso | en_US | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | exploit | en_US |
dc.subject | Symbolic Execution | en_US |
dc.subject | taint analysis | en_US |
dc.subject | information leakage | en_US |
dc.title | Automatic Exploitation of Fully Randomized Executables | en_US |
dc.type | Article | en_US |