2018 | OriginalPaper | Chapter
PwIN – Pwning Intel piN: Why DBI is Unsuitable for Security Applications
Authors : Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, Thomas Kittel
Published in: Computer Security
Publisher: Springer International Publishing
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Abstract
x86-64
Linux as an example to show that assuming a program is running in context of a DBI framework (2) the presence thereof can be detected, (3) policies introduced by binary hardening mechanisms can be subverted, and (4) otherwise hard-to-exploit bugs can be escalated to full code execution.