Show simple item record

dc.contributor.authorSkowyra, Richard
dc.contributor.authorCasteel, Kelly
dc.contributor.authorOkhravi, Hamed
dc.contributor.authorZeldovich, Nickolai
dc.contributor.authorStreilein, William W.
dc.date.accessioned2014-10-31T16:45:03Z
dc.date.available2014-10-31T16:45:03Z
dc.date.issued2013
dc.identifier.isbn978-3-642-41283-7
dc.identifier.isbn978-3-642-41284-4
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/91251
dc.description.abstractSince the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers makes it difficult to evaluate the effectiveness of defenses, and answer critical questions about the interoperability, composability, and efficacy of existing defensive techniques. For example, what combination of defenses protect against every known avenue of code reuse? What is the smallest set of such defenses? In this work, we study the space of code reuse attacks by building a formal model of attacks and their requirements, and defenses and their assumptions. We use a SAT solver to perform scenario analysis on our model in two ways. First, we analyze the defense configurations of a real-world system. Second, we reason about hypothetical defense bypasses. We prove by construction that attack extensions implementing the hypothesized functionality are possible even if a ‘perfect’ version of the defense is implemented. Our approach can be used to formalize the process of threat model definition, analyze defense configurations, reason about composability and efficacy, and hypothesize about new attacks and defenses.en_US
dc.description.sponsorshipUnited States. Air Force (Assistant Secretary of Defense for Research & Engineering Contract #FA8721-05-C-0002)en_US
dc.language.isoen_US
dc.publisherSpringer-Verlag Berlin Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-41284-4_5en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleSystematic Analysis of Defenses against Return-Oriented Programmingen_US
dc.typeArticleen_US
dc.identifier.citationSkowyra, Richard, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, and William Streilein. “Systematic Analysis of Defenses Against Return-Oriented Programming.” Berlin: Springer Verlag, (Lecture Notes in Computer Science ; volume 8145) (2013): 82–102.en_US
dc.contributor.departmentLincoln Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorCasteel, Kellyen_US
dc.contributor.mitauthorOkhravi, Hameden_US
dc.contributor.mitauthorZeldovich, Nickolaien_US
dc.contributor.mitauthorStreilein, William W.en_US
dc.relation.journalResearch in Attacks, Intrusions, and Defensesen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsSkowyra, Richard; Casteel, Kelly; Okhravi, Hamed; Zeldovich, Nickolai; Streilein, Williamen_US
dc.identifier.orcidhttps://orcid.org/0000-0003-0238-2703
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record