Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Gawlik, Robert"'
Memory corruption vulnerabilities are still a severe threat for software systems. To thwart the exploitation of such vulnerabilities, many different kinds of defenses have been proposed in the past. Most prominently, Control-Flow Integrity (CFI) has
Externí odkaz:
http://arxiv.org/abs/2007.04116
Autor:
Gawlik, Robert, Koppe, Philipp, Kollenda, Benjamin, Pawlowski, Andre, Garmany, Behrad, Holz, Thorsten
Memory disclosure attacks play an important role in the exploitation of memory corruption vulnerabilities. By analyzing recent research, we observe that bypasses of defensive solutions that enforce control-flow integrity or attempt to detect return-o
Externí odkaz:
http://arxiv.org/abs/2007.03550
More than two decades after the first stack smashing attacks, memory corruption vulnerabilities utilizing stack anomalies are still prevalent and play an important role in practice. Among such vulnerabilities, uninitialized variables play an exceptio
Externí odkaz:
http://arxiv.org/abs/2007.02314
Autor:
Koppe, Philipp, Kollenda, Benjamin, Fyrbiak, Marc, Kison, Christian, Gawlik, Robert, Paar, Christof, Holz, Thorsten
Publikováno v:
SEC 2017 Proceedings of the 26th USENIX Conference on Security Symposium Pages 1163-1180
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patc
Externí odkaz:
http://arxiv.org/abs/1910.00948
Autor:
Gawlik, Robert (Dipl.)
Diese Dissertation beschäftigt sich mit der Auswirkung von Speicherfehlern in clientseitigen Anwendungen - speziell Webbrowsern. Der Ausnutzungsprozess von Speicherfehlern kann in verschiedene, aufeinanderfolgende Schritte unterteilt werden. Als ein
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3579::7b1f318caf3a7794e4ce200ea9326eeb
https://hss-opus.ub.ruhr-uni-bochum.de/opus4/files/5000/diss.pdf
https://hss-opus.ub.ruhr-uni-bochum.de/opus4/files/5000/diss.pdf
Autor:
Gawlik, Robert, Koppe, Philipp, Kollenda, Benjamin, Pawlowski, Andre, Garmany, Behrad, Holz, Thorsten
Publikováno v:
Detection of Intrusions & Malware & Vulnerability Assessment (9783319406664); 2016, p322-342, 21p
Publikováno v:
Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I; 2016, p602-620, 19p
Publikováno v:
IT: Information Technology; Apr2017, Vol. 59 Issue 2, p83-91, 9p
Publikováno v:
2015 IEEE Symposium on Security & Privacy; 2015, p709-724, 16p
Autor:
Gawlik, Robert, Holz, Thorsten
Publikováno v:
ACM International Conference Proceeding Series; 12/8/2014, p396-405, 10p