2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.51
|View full text |Cite
|
Sign up to set email alerts
|

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

Abstract: Code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. A variety of corresponding defenses has been proposed, of which some have already been successfully bypassed-and the arms race continues.In this paper, we perform a systematic assessment of recently proposed CFI solutions and other defenses against code reuse attacks in the context of C++. We demonstrate that many of these defenses that do not consider… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
191
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 255 publications
(191 citation statements)
references
References 34 publications
0
191
0
Order By: Relevance
“…The COOP (Counterfeit Object-oriented Programming) attack proposed by Schuster et.al. [28] introduces a specific type of VTable reuse attack. By stitching several virtual functions, attackers may execute arbitrary code.…”
Section: B Attack Surfacementioning
confidence: 99%
See 3 more Smart Citations
“…The COOP (Counterfeit Object-oriented Programming) attack proposed by Schuster et.al. [28] introduces a specific type of VTable reuse attack. By stitching several virtual functions, attackers may execute arbitrary code.…”
Section: B Attack Surfacementioning
confidence: 99%
“…Modern compilers place VTables in read-only sections, defeating VTable corruption attacks by default. But VTable injection attacks are still one of the most popular attacks, and VTable reuse attacks are also practical and hard to defeat [28].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It's a software-based approach to detect attacks. Recently Schuster et al [2] came up with a new type of attack, called counterfeit object-oriented programming (COOP).…”
Section: Related Workmentioning
confidence: 99%