Loading…
SecAppDev 2018 has ended
Monday, February 19 • 13:40 - 15:10
Why none of your defenses will really stop attackers (but may still be useful)

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Modern defenses against code reuse attacks almost always use the wrong threat model. As a result, attackers can bypass them, and exploit seemingly secure software.


 Abstract
30 years after the Morris Worm, we are still unable to stop exploits based on memory corruption. Admittedly, the community has developed extremely advanced defenses. As such, the bar for attackers is now much higher than it ever was. Unfortunately, if you look at the overall picture, this is still a losing battle. Today, attackers can launch code reuse attacks without ever learning any addresses of the code fragments.

Modern defenses tend to rely on assumptions that often turn out to be invalid. They misjudge the strength of the defense or the inventiveness of the attacker. In this session, we will discuss current attacks and defenses and show to what extent they make exploitation harder. We will investigate how using dynamic code analysis already suffices to bypass these defenses. In the end, you will be able to assess the security of your systems in the modern threat landscape.


This session is intended for anyone building systems in low-level languages such as C and C++

Speakers
avatar for Herbert Bos

Herbert Bos

Full professor, Vrije Universiteit Amsterdam
Herbert Bos is a full professor at VUSec, the systems security group at Vrije Universiteit Amsterdam in the Netherlands. He obtained his Ph.D. from Cambridge University Computer Laboratory (UK). Coming from a systems background, he drifted into security a few years ago and never left... Read More →



Monday February 19, 2018 13:40 - 15:10 GMT
Room: Lemaire

Attendees (4)