The Evolution of Stack Control Flow Attacks

0ae28f6d917d7810b9117e915bf3ded3?s=47 Xiaokui Shu
October 16, 2013

The Evolution of Stack Control Flow Attacks

Exploit is one of the biggest security threats to programs in general. The past 20 years saw the development of the stack-based control flow attacks. The presentation summaries the key events in the evolution, explains the techniques used in the attacks and gives a security thought towards Control Flow Integrity. Key events: smashing the stack, return into library (return-into-libc), return oriented programming, return oriented programming without returns.

0ae28f6d917d7810b9117e915bf3ded3?s=128

Xiaokui Shu

October 16, 2013
Tweet