{teEther}: Gnawing at ethereum to automatically exploit smart contracts

J Krupp, C Rossow - … USENIX security symposium (USENIX Security 18), 2018 - usenix.org
Cryptocurrencies like Bitcoin not only provide a decentralized currency, but also provide a
programmatic way to process transactions. Ethereum, the second largest cryptocurrency …

Data-oriented programming: On the expressiveness of non-control data attacks

H Hu, S Shinde, S Adrian, ZL Chua… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
As control-flow hijacking defenses gain adoption, it is important to understand the remaining
capabilities of adversaries via memory exploits. Non-control data exploits are used to mount …

Code-pointer integrity

V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …

Exploitation techniques for data-oriented attacks with existing and potential defense approaches

L Cheng, S Ahmed, H Liljestrand, T Nyman… - ACM Transactions on …, 2021 - dl.acm.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

Block oriented programming: Automating data-only attacks

KK Ispoglou, B AlBassam, T Jaeger… - Proceedings of the 2018 …, 2018 - dl.acm.org
With the widespread deployment of Control-Flow Integrity (CFI), control-flow hijacking
attacks, and consequently code reuse attacks, are significantly more difficult. CFI limits …

Where does it go? refining indirect-call targets with multi-layer type analysis

K Lu, H Hu - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …

Semfuzz: Semantics-based automatic generation of proof-of-concept exploits

W You, P Zong, K Chen, XF Wang, X Liao… - Proceedings of the …, 2017 - dl.acm.org
Patches and related information about software vulnerabilities are often made available to
the public, aiming to facilitate timely fixes. Unfortunately, the slow paces of system updates …

[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.

C Song, B Lee, K Lu, W Harris, T Kim, W Lee - NDSS, 2016 - researchgate.net
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …

Practical {Data-Only} attack generation

B Johannesmeyer, A Slowinska, H Bos… - 33rd USENIX Security …, 2024 - usenix.org
As control-flow hijacking is getting harder due to increasingly sophisticated CFI solutions,
recent work has instead focused on automatically building data-only attacks, typically using …