2015
DOI: 10.1109/msp.2015.75
|View full text |Cite
|
Sign up to set email alerts
|

Bypassing EMET 4.1

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 0 publications
1
4
0
Order By: Relevance
“…Based on this large set of ROP sequences we constructed a proof-of-concept ROP exploit that launches a new shell to the adversary. Our proof-of-concept attack demonstrates the ineffectiveness of coarse-grained CFI, and confirms the attacks recently presented against Windows EMET and CFI for COTS binaries [7,8].…”
Section: Problems Of Coarse-grained Cfisupporting
confidence: 84%
“…Based on this large set of ROP sequences we constructed a proof-of-concept ROP exploit that launches a new shell to the adversary. Our proof-of-concept attack demonstrates the ineffectiveness of coarse-grained CFI, and confirms the attacks recently presented against Windows EMET and CFI for COTS binaries [7,8].…”
Section: Problems Of Coarse-grained Cfisupporting
confidence: 84%
“…When a package contains more than one exploit, the cost of a single exploit can only be estimated. From the literature on exploit development and deployment [9,24,29,30,48,76] two aspects of vulnerabilities emerge as drivers of exploitation effort: 1) vulnerability type (e.g. memory corruption vs cross-site-scripting) [29,48,76]; 2) exploitation complexity (e.g.…”
Section: Analysis Proceduresmentioning
confidence: 99%
“…memory corruption vs cross-site-scripting) [29,48,76]; 2) exploitation complexity (e.g. to evade attack mitigation techniques) [20,24,29].…”
Section: Analysis Proceduresmentioning
confidence: 99%
“…EMET's MemProt rule can protect against such attacks as it monitors the VirtualProtect() function, but not against ROPInjector, since the latter neither has to call VirutalProtect() nor it has to perform memory corruption attacks as the whole executable is under its control. As a side note, it is important to mention that various research works such as the one presented in [27] have shown that EMET rules can be bypassed trivially and in general they are insufficient to protect against memory corruption attacks.…”
Section: Fig 7: Evasion Ratio Of Ropinjector For the Reverse Meterprmentioning
confidence: 99%