BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:The Difficulty of Preventing Code Reuse Attacks - Felix Schuster\,
  University of Bochum
DTSTART:20150216T090000Z
DTEND:20150216T100000Z
UID:TALK57922@talks.cam.ac.uk
CONTACT:Microsoft Research Cambridge Talks Admins
DESCRIPTION:In this talk\, I will give a brief introduction to code reuse 
 attacks - e.g.\, return-oriented programming - and give an overview on rec
 ent developments in defenses\; including academic proposal as well as actu
 ally deployed ones such as EMET and CFG.\n\nI will present my own work on 
 two advanced attack techniques dubbed "Branch History Flushing" (RAID 2014
 ) and "Counterfeit Object-oriented Programming" (short COOP\; in submissio
 n). COOP abuses common artifacts in binary C++ code and breaks with long-h
 eld assumptions on the nature of code reuse attacks. Consequently\, it byp
 asses a wide range of existing defenses including the recently proposed "C
 ode-Pointer Separation" (practical "Code-Pointer Integrity"\; OSDI 2014) a
 nd Windows 10's CFG. I will discuss in particular why currently no strong 
 defense against COOP exists that does not require access to a software's s
 ource code and why designing a strong binary-only defense will be challeng
 ing.\n\nThe main takeaway should be that many of today's defenses are buil
 t on improper assumptions and that even supposedly small "wiggle room" for
  an attacker can still lead to full system compromise.
LOCATION:Small Lecture Theatre\, Microsoft Research Ltd\, 21 Station Road\
 , Cambridge\, CB1 2FB
END:VEVENT
END:VCALENDAR
