Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Koppe, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.03550  [pdf, ps, other

    cs.CR

    Detile: Fine-Grained Information Leak Detection in Script Engines

    Authors: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz

    Abstract: Memory disclosure attacks play an important role in the exploitation of memory corruption vulnerabilities. By analyzing recent research, we observe that bypasses of defensive solutions that enforce control-flow integrity or attempt to detect return-oriented programming require memory disclosure attacks as a fundamental first step. However, research lags behind in detecting such information leaks.… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

  2. arXiv:2007.03549  [pdf, other

    cs.CR

    An Exploratory Analysis of Microcode as a Building Block for System Defenses

    Authors: Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer used by modern x86 processors that interprets user-visible CISC instructions to hardware-internal RISC instructions. The capability to update x86 microcode enables a vendor to modify CPU behavior in-field, and thus patch erroneous microarchitectural processes or even implement new features. Most prominently, the recent Spectre and Meltdown vulnerabilities were mit… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Published in ACM SIGSAC Conference on Computer and Communications Security (CCS'18)

  3. arXiv:2007.03548  [pdf, other

    cs.CR

    Breaking and Fixing Destructive Code Read Defenses

    Authors: Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz

    Abstract: Just-in-time return-oriented programming (JIT-ROP) is a powerful memory corruption attack that bypasses various forms of code randomization. Execute-only memory (XOM) can potentially prevent these attacks, but requires source code. In contrast, destructive code reads (DCR) provide a trade-off between security and legacy compatibility. The common belief is that DCR provides strong protection if com… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 33rd Annual Computer Security Applications Conference (ACSAC'17)

  4. arXiv:2007.02308  [pdf, other

    cs.CR

    Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming

    Authors: Jannik Pewny, Philipp Koppe, Thorsten Holz

    Abstract: The wide-spread adoption of system defenses such as the randomization of code, stack, and heap raises the bar for code-reuse attacks. Thus, attackers utilize a scripting engine in target programs like a web browser to prepare the code-reuse chain, e.g., relocate gadget addresses or perform a just-in-time gadget search. However, many types of programs do not provide such an execution context that a… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Published in 4th IEEE European Symposium on Security and Privacy (EuroS&P'19)

  5. arXiv:1910.00948  [pdf, other

    cs.CR

    Reverse Engineering x86 Processor Microcode

    Authors: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patched in-place without requiring any special hardware. While it is well-known that CPUs are regularly updated with this mechanism, very little is known… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: SEC 2017 Proceedings of the 26th USENIX Conference on Security Symposium Pages 1163-1180

  6. Interdiction in Practice -- Hardware Trojan Against a High-Security USB Flash Drive

    Authors: Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar

    Abstract: As part of the revelations about the NSA activities, the notion of interdiction has become known to the public: the interception of deliveries to manipulate hardware in a way that backdoors are introduced. Manipulations can occur on the firmware or at hardware level. With respect to hardware, FPGAs are particular interesting targets as they can be altered by manipulating the corresponding bitstrea… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: J Cryptogr Eng (2017) 7: 199