نتایج جستجو برای: aslr

تعداد نتایج: 97  

Journal: :Remote Sensing 2022

Previous studies have estimated the sea level rise (SLR) at various locations on west coast of USA and Vancouver Island in Canada. Here, we construct an entire SLR profile from Pacific Northwest to San Diego Southern California. First, process global navigation satellite system (GNSS) measurements 405 stations blanketing whole generate a vertical land motion (VLM) known bias century-long tide g...

2016
Scott Brookes Stephen Taylor

The weak separation between userand kernelspace in modern operating systems facilitates several forms of privilege escalation. This paper provides a survey of protection techniques, both cutting-edge and time-tested, used to prevent common privilege escalation attacks. The techniques are compared against each other in terms of their effectiveness, their performance impact, the complexity of the...

2011
Mark Wilson Lei Chen

The Internet and mobile devices today have merged seamlessly, giving smartphone users access to the World Wide Web, email and other network services and resources. Due to the increased popularity of smartphones they have become a very attractive target for malware. It is predicted that smartphone users will see a multitude of different malware attacks aimed at their mobile devices in the near f...

2012
Ralf-Philipp Weinmann

Published attacks against smartphones have concentrated on software running on the application processor. With numerous countermeasures like ASLR, DEP and code signing being deployed by operating system vendors, practical exploitation of memory corruptions on this processor has become a time-consuming endeavor. At the same time, the cellular baseband stack of most smartphones runs on a separate...

2016
Sergio Pastrana Juan E. Tapiador Guillermo Suarez-Tangil Pedro Peris-López

Code reuse attacks are advanced exploitation techniques that constitute a serious threat for modern systems. They profit from a control flow hijacking vulnerability to maliciously execute one or more pieces of code from the targeted application. ASLR and Control Flow Integrity are two mechanisms commonly used to deter automated attacks based on code reuse. Unfortunately, none of these solutions...

2017
Stuart Steiner Daniel Conte de Leon Jim Alves-Foss

SQL injection attacks (SQLIA) still remain one of the most commonly occurring and exploited vulnerabilities. A considerable amount of research concerning SQLIA mitigation techniques has been conducted with the primary resulting solution requiring developers to code defensively. Although, defensive coding is a valid solution, the current market demand for websites is being filled by inexperience...

2011
Ping Chen Yi Fang Bing Mao Li Xie

JIT spraying is a new code-reuse technique to attack virtual machines based on JIT (Just-in-time) compilation. It has proven to be capable of circumventing the defenses such as data execution prevention (DEP) and address space layout randomization(ASLR), which are effective for preventing the traditional code injection attacks. In this paper, we describe JITDefender, an enhancement of standard ...

2014
Christopher Kugler Tilo Müller

Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end. In this paper, we present a compiler-level protection called SCADS: Separated Controland Data-Stacks. In our approach, we protect return addresses and saved frame pointers on a separate stack, called t...

2016
Kangjie Lu Wenke Lee Stefan Nürnberger Michael Backes

Existing techniques for memory randomization such as the widely explored Address Space Layout Randomization (ASLR) perform a single, per-process randomization that is applied before or at the process’ load-time. The efficacy of such upfront randomizations crucially relies on the assumption that an attacker has only one chance to guess the randomized address, and that this attack succeeds only w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید