Hacking Blind

@article{Bittau2014HackingB,
  title={Hacking Blind},
  author={Andrea Bittau and Adam Belay and Ali Jos{\'e} Mashtizadeh and David Mazi{\`e}res and Dan Boneh},
  journal={2014 IEEE Symposium on Security and Privacy},
  year={2014},
  pages={227-242}
}
We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of the target binary or source code, against services that restart after a crash. This makes it possible to hack proprietary closed-binary services, or open-source servers manually compiled and installed from source where the binary remains unknown to the attacker. Traditional techniques are usually paired against a particular binary and distribution where the hacker knows the location of useful… CONTINUE READING
Highly Influential
This paper has highly influenced 26 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 140 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 97 extracted citations

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation

2017 IEEE Conference on Dependable and Secure Computing • 2017
View 4 Excerpts
Highly Influenced

Reasoning about Probabilistic Defense Mechanisms against Remote Attacks

2017 IEEE European Symposium on Security and Privacy (EuroS&P) • 2017
View 18 Excerpts
Highly Influenced

Poking Holes in Information Hiding

View 7 Excerpts
Highly Influenced

Missing the Point(er): On the Effectiveness of Code Pointer Integrity

2015 IEEE Symposium on Security and Privacy • 2015
View 9 Excerpts
Highly Influenced

140 Citations

02040'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 140 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Mwr labs pwn2own 2013 write-up - webkit exploit

M. Labes
[Online]. Available: • 2013
View 1 Excerpt

ILR: Where'd My Gadgets Go?

2012 IEEE Symposium on Security and Privacy • 2012
View 1 Excerpt

Half-Blind Attacks : Mask ROM Bootloaders are Dangerous

OxFF OxFF OxFF OxFF OxFF OxFF OxFF OxFF OxFF OxFF OxFF OxFFOx, C OxFF OxFF OxFF OxFF OxFF OxFF OxFFOx, OxFF OxFF OxFF OxFF OxFF OxFF OxFFOx
2009
View 1 Excerpt

Surgically Returning to Randomized lib(c)

2009 Annual Computer Security Applications Conference • 2009
View 1 Excerpt

Similar Papers

Loading similar papers…