Organizer: CROSSING / GRK Privacy & Trust / CRISP
Code reuse attacks have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. The focus of most attacks is on modifying code pointer and a variety of corresponding defenses has been proposed, of which some have already been successfully bypassed. With data-oriented attacks, new opportunities for attackers have emerged and the arms race continues. …
In this talk, we provide an overview of some of our recent work towards code-reuse attacks and defenses. We conclude the talk with some ideas for future work in this area.
is a full professor in the Faculty of Electrical Engineering and Information Technology at Ruhr-University Bochum (RUB). His research interests include systems-oriented aspects of secure systems, with a specific focus on applied computer security. Thorsten Holz