Please use this identifier to cite or link to this item:
http://hdl.handle.net/2445/179863
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Roca Cánovas, Raúl | - |
dc.contributor.author | Ornaque Blázquez, Oriol | - |
dc.date.accessioned | 2021-09-07T09:12:55Z | - |
dc.date.available | 2021-09-07T09:12:55Z | - |
dc.date.issued | 2021-06-20 | - |
dc.identifier.uri | http://hdl.handle.net/2445/179863 | - |
dc.description | Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Raúl Roca Cánovas | ca |
dc.description.abstract | [en] Binaries, or programs compiled down to executables, might come with errors or bugs that could trigger behavior unintended by their authors. By carefully understanding the environment where programs get executed, the instructions and the memory, an attacker can gracefully craft a specific input, tailored to trigger these unintended behaviors and gain control over the original logic of the program. One of the ways this could be achieved, is by corrupting critical values in memory. This works focuses on the main techniques to exploit buffer overfows and other memory corruption vulnerabilities to exploit binaries. Also a proof-of-concept for CVE-2021-3156 is presented with an analysis of its inner workings. | ca |
dc.format.extent | 69 p. | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | ca |
dc.rights | memòria: cc-nc-nd (c) Oriol Ornaque Blázquez, 2021 | - |
dc.rights | codi: GPL (c) Oriol Ornaque Blázquez, 2021 | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.rights.uri | http://www.gnu.org/licenses/gpl-3.0.ca.html | * |
dc.source | Treballs Finals de Grau (TFG) - Enginyeria Informàtica | - |
dc.subject.classification | Seguretat informàtica | ca |
dc.subject.classification | Gestió de memòria (Informàtica) | ca |
dc.subject.classification | Programari | ca |
dc.subject.classification | Treballs de fi de grau | ca |
dc.subject.classification | Arquitectura d'ordinadors | ca |
dc.subject.other | Computer security | en |
dc.subject.other | Memory management (Computer science) | en |
dc.subject.other | Computer software | en |
dc.subject.other | Computer architecture | en |
dc.subject.other | Bachelor's theses | en |
dc.title | Binary exploitation: Memory corruption | ca |
dc.type | info:eu-repo/semantics/bachelorThesis | ca |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | ca |
Appears in Collections: | Treballs Finals de Grau (TFG) - Enginyeria Informàtica |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
codi179863.zip | Codi font | 15.41 kB | zip | View/Open |
179863.pdf | Memòria | 3.04 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License