Zum Hauptinhalt springen

Showing 1–4 of 4 results for author: Burow, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:1906.02928  [pdf, other

    cs.CR

    Software Ethology: An Accurate, Resilient, and Cross-Architecture Binary Analysis Framework

    Authors: Derrick McKee, Nathan Burow, Mathias Payer

    Abstract: When reverse engineering a binary, the analyst must first understand the semantics of the binary's functions through either manual or automatic analysis. Manual semantic analysis is time-consuming, because abstractions provided by high level languages, such as type information, variable scope, or comments are lost, and past analyses cannot apply to the current analysis task. Existing automated bin… ▽ More

    Submitted 30 June, 2020; v1 submitted 7 June, 2019; originally announced June 2019.

  2. Shining Light On Shadow Stacks

    Authors: Nathan Burow, Xinping Zhang, Mathias Payer

    Abstract: Control-Flow Hijacking attacks are the dominant attack vector against C/C++ programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the forward edge,i.e., indirect calls through function pointers and virtual calls. Protecting the backward edge is left to stack canaries, which are easily bypassed through information leaks. Shadow Stacks are a fully precise mechanism for protectin… ▽ More

    Submitted 1 March, 2019; v1 submitted 7 November, 2018; originally announced November 2018.

    Comments: To Appear in IEEE Security and Privacy 2019

  3. CUP: Comprehensive User-Space Protection for C/C++

    Authors: Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer

    Abstract: Memory corruption vulnerabilities in C/C++ applications enable attackers to execute code, change data, and leak information. Current memory sanitizers do no provide comprehensive coverage of a program's data. In particular, existing tools focus primarily on heap allocations with limited support for stack allocations and globals. Additionally, existing tools focus on the main executable with limite… ▽ More

    Submitted 17 April, 2017; originally announced April 2017.

  4. Control-Flow Integrity: Precision, Security, and Performance

    Authors: Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer

    Abstract: Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today's systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control flow. Researchers have spent more than a decade studying and refining defenses based on Control-Flow Integrity (CFI), and this technique is now int… ▽ More

    Submitted 27 January, 2017; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: Version submitted to ACM CSUR 01/27/17