2008 the Third International Multi-Conference on Computing in the Global Information Technology (Iccgi 2008) 2008
DOI: 10.1109/iccgi.2008.21
|View full text |Cite
|
Sign up to set email alerts
|

Describing Data Format Exploits Using Bitstream Segment Graphs

Abstract: Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of Bitstream S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2008
2008

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…It allows to document the composition of data and thus serves well during reverse-engineering of instances of unpublished data formats used in protocols and file formats. A practical example is the reverseengineering of exploits in IT Security using BSGs (Hartle et al, 2008) in order to understand its mechanisms and patch vulnerable implementations.…”
Section: Discussionmentioning
confidence: 99%
“…It allows to document the composition of data and thus serves well during reverse-engineering of instances of unpublished data formats used in protocols and file formats. A practical example is the reverseengineering of exploits in IT Security using BSGs (Hartle et al, 2008) in order to understand its mechanisms and patch vulnerable implementations.…”
Section: Discussionmentioning
confidence: 99%