JIT Spraying and Mitigations

@article{Bania2010JITSA,
  title={JIT Spraying and Mitigations},
  author={Piotr Bania},
  journal={ArXiv},
  year={2010},
  volume={abs/1009.1038}
}
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for exploitation. Attackers, however, have recently researched new exploitation methods which are capable of bypassing the operating system's memory mitigations. One of the newest and most popular exploitation techniques to bypass both of the aforementioned… CONTINUE READING
2
Twitter Mentions

Citations

Publications citing this paper.
SHOWING 1-10 OF 13 CITATIONS

A structural and content-based approach for a precise and robust detection of malicious PDF files

  • 2015 International Conference on Information Systems Security and Privacy (ICISSP)
  • 2015
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Lobotomy: An Architecture for JIT Spraying Mitigation

  • 2014 Ninth International Conference on Availability, Reliability and Security
  • 2014
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.