On the Expressiveness of Return-into-libc Attacks

@inproceedings{Tran2011OnTE,
  title={On the Expressiveness of Return-into-libc Attacks},
  author={M. Tran and M. Etheridge and T. Bletsch and X. Jiang and V. W. Freeh and P. Ning},
  booktitle={RAID},
  year={2011}
}
Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. [...] Key Result The development of TC-RILC on both Linux and Windows platforms demonstrates the expressiveness and practicality of the generalized RILC attack.Expand
116 Citations
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
  • 296
  • PDF
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks
  • 240
  • PDF
Out of Control: Overcoming Control-Flow Integrity
  • 328
  • Highly Influenced
  • PDF
Binary Debloating for Security via Demand Driven Loading
  • 3
  • PDF
Subversive-C: Abusing and Protecting Dynamic Message Dispatch
  • 11
  • PDF
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
  • 101
  • PDF
A Formal Model for an Ideal CFI
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses
  • 7
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 40 REFERENCES
Jump-oriented programming: a new class of code-reuse attack
  • 437
  • PDF
Return-Oriented Programming without Returns on ARM
  • 37
  • PDF
Return-oriented programming without returns
  • 480
  • PDF
When good instructions go bad: generalizing return-oriented programming to RISC
  • 367
  • PDF
G-Free: defeating return-oriented programming through gadget-less binaries
  • 246
  • PDF
Surgically Returning to Randomized lib(c)
  • 119
  • PDF
Countering code-injection attacks with instruction-set randomization
  • 686
  • PDF
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)
  • 1,186
  • PDF
...
1
2
3
4
...