Zum Hauptinhalt springen

Showing 1–4 of 4 results for author: Gawlik, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.04116  [pdf, other

    cs.CR

    Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets

    Authors: Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz

    Abstract: Memory corruption vulnerabilities are still a severe threat for software systems. To thwart the exploitation of such vulnerabilities, many different kinds of defenses have been proposed in the past. Most prominently, Control-Flow Integrity (CFI) has received a lot of attention recently. Several proposals were published that apply coarse-grained policies with a low performance overhead. However, th… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Published in 21st European Symposium on Research in Computer Security (ESORICS'16)

  2. arXiv:2007.03550  [pdf, ps, other

    cs.CR

    Detile: Fine-Grained Information Leak Detection in Script Engines

    Authors: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz

    Abstract: Memory disclosure attacks play an important role in the exploitation of memory corruption vulnerabilities. By analyzing recent research, we observe that bypasses of defensive solutions that enforce control-flow integrity or attempt to detect return-oriented programming require memory disclosure attacks as a fundamental first step. However, research lags behind in detecting such information leaks.… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

  3. arXiv:2007.02314  [pdf, other

    cs.CR

    Static Detection of Uninitialized Stack Variables in Binary Code

    Authors: Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz

    Abstract: More than two decades after the first stack smashing attacks, memory corruption vulnerabilities utilizing stack anomalies are still prevalent and play an important role in practice. Among such vulnerabilities, uninitialized variables play an exceptional role due to their unpleasant property of unpredictability: as compilers are tailored to operate fast, costly interprocedural analysis procedures a… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 2019 European Symposium on Research in Computer Security (ESORICS'19)

  4. arXiv:1910.00948  [pdf, other

    cs.CR

    Reverse Engineering x86 Processor Microcode

    Authors: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patched in-place without requiring any special hardware. While it is well-known that CPUs are regularly updated with this mechanism, very little is known… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: SEC 2017 Proceedings of the 26th USENIX Conference on Security Symposium Pages 1163-1180