TUM Logo

Analysis and Evaluation of Binary Exploitation Mitigation Techniques

Reliable binary exploitation mitigation techniques exist for decades and are deployed to operating systems in various forms. Different operating systems interpret these techniques individually for their respective imple- mentation. This thesis provides an in-depth analysis on currently deployed and en- abled techniques in Linux, MacOS, OpenBSD and Windows. Not only the implementation itself will be discussed, but also possible attack vectors. This thesis also examines the new techniques of Control Flow Integrity and Code Pointer Integrity in theory and in concrete implementations. Elemen- tary testcases for forward edge CFI and a practical attack vector against the SafeStack (CPI) implementation of LLVM/Clang will be proposed.

Analysis and Evaluation of Binary Exploitation Mitigation Techniques

Supervisor(s): Julian Kirsch Bruno Bierbaumer
Status: finished
Topic: Anomaly Detection
Author: Martin Steil
Submission: 2017-10-20
Type of Thesis: Masterthesis
Proof of Concept No

Astract:

Reliable binary exploitation mitigation techniques exist for decades and are deployed to operating systems in various forms. Different operating systems interpret these techniques individually for their respective imple- mentation. This thesis provides an in-depth analysis on currently deployed and en- abled techniques in Linux, MacOS, OpenBSD and Windows. Not only the implementation itself will be discussed, but also possible attack vectors. This thesis also examines the new techniques of Control Flow Integrity and Code Pointer Integrity in theory and in concrete implementations. Elemen- tary testcases for forward edge CFI and a practical attack vector against the SafeStack (CPI) implementation of LLVM/Clang will be proposed.