Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Pawlowski, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.03550  [pdf, ps, other

    cs.CR

    Detile: Fine-Grained Information Leak Detection in Script Engines

    Authors: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz

    Abstract: Memory disclosure attacks play an important role in the exploitation of memory corruption vulnerabilities. By analyzing recent research, we observe that bypasses of defensive solutions that enforce control-flow integrity or attempt to detect return-oriented programming require memory disclosure attacks as a fundamental first step. However, research lags behind in detecting such information leaks.… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

  2. arXiv:2007.03302  [pdf, ps, other

    cs.CR

    VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

    Authors: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos

    Abstract: Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers can potentially hijack and in practice, vtable hijacking is one of the most important attack vector for C++ binaries. In this paper, we present VTab… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Published in Annual Computer Security Applications Conference (ACSAC'19)

  3. arXiv:1907.01933  [pdf, other

    cs.CR

    Towards Automated Application-Specific Software Stacks

    Authors: Nicolai Davidsson, Andre Pawlowski, Thorsten Holz

    Abstract: Software complexity has increased over the years. One common way to tackle this complexity during development is to encapsulate features into a shared library. This allows developers to reuse already implemented features instead of reimplementing them over and over again. However, not all features provided by a shared library are actually used by an application. As a result, an application using s… ▽ More

    Submitted 16 September, 2019; v1 submitted 3 July, 2019; originally announced July 2019.