On the power of techniques for defeating code reuse attacks + some retrospective reflection on the DARPA CRASH program
- đ¤ Speaker: Prof Howie Shrobe (MIT)
- đ Date & Time: Tuesday 12 May 2015, 14:00 - 15:00
- đ Venue: LT2, Computer Laboratory, William Gates Building
Abstract
Abstract: Code reuse attacks (Return Oriented Programming, etc) have become one the key tools in the arsenal of attackers who are retrying to subvert remote systems through technical means. A new defensive technique, called Code Pointer Integrity, or CPI was proposed this past summer. It has the attractive property of being implemented wholly in software, seeming to offer broad coverage against code reuse attacks while imposing modest performance penalties (~6%). In an upcoming paper, our group demonstrated a technique for bypassing CPI . I will explain how code reuse attacks work, how CPI was supposed to prevent them, and how we bypassed CPI . I will also outline some work that we are currently conducting that uses a simple hardware architectural extension to prevent against both code reuse and code injection attacks (and probably other types of attacks as well).
This work grew out of an attempt to harvest some of the simpler ideas explored in DARPA âs CRASH program (of which I was the program manager). I share some personal reflections on the CRASH program and what it produced.
Series This talk is part of the Computer Laboratory Security Seminar series.
Included in Lists
- All Talks (aka the CURE list)
- bld31
- Cambridge talks
- Computer Laboratory Security Seminar
- Department of Computer Science and Technology talks and seminars
- Interested Talks
- LT2, Computer Laboratory, William Gates Building
- School of Technology
- Security-related talks
- Trust & Technology Initiative - interesting events
- yk449
Note: Ex-directory lists are not shown.
![[Talks.cam]](/static/images/talkslogosmall.gif)

Prof Howie Shrobe (MIT)
Tuesday 12 May 2015, 14:00-15:00