Binary exploitation: Memory corruption

dc.contributor.advisorRoca Cánovas, Raúl
dc.contributor.authorOrnaque Blázquez, Oriol
dc.date.accessioned2021-09-07T09:12:55Z
dc.date.available2021-09-07T09:12:55Z
dc.date.issued2021-06-20
dc.descriptionTreballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Raúl Roca Cánovasca
dc.description.abstract[en] Binaries, or programs compiled down to executables, might come with errors or bugs that could trigger behavior unintended by their authors. By carefully understanding the environment where programs get executed, the instructions and the memory, an attacker can gracefully craft a specific input, tailored to trigger these unintended behaviors and gain control over the original logic of the program. One of the ways this could be achieved, is by corrupting critical values in memory. This works focuses on the main techniques to exploit buffer overfows and other memory corruption vulnerabilities to exploit binaries. Also a proof-of-concept for CVE-2021-3156 is presented with an analysis of its inner workings.ca
dc.format.extent69 p.
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://hdl.handle.net/2445/179863
dc.language.isoengca
dc.rightsmemòria: cc-nc-nd (c) Oriol Ornaque Blázquez, 2021
dc.rightscodi: GPL (c) Oriol Ornaque Blázquez, 2021
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessca
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.rights.urihttp://www.gnu.org/licenses/gpl-3.0.ca.html*
dc.sourceTreballs Finals de Grau (TFG) - Enginyeria Informàtica
dc.subject.classificationSeguretat informàticaca
dc.subject.classificationGestió de memòria (Informàtica)ca
dc.subject.classificationProgramarica
dc.subject.classificationTreballs de fi de grauca
dc.subject.classificationArquitectura d'ordinadorsca
dc.subject.otherComputer securityen
dc.subject.otherMemory management (Computer science)en
dc.subject.otherComputer softwareen
dc.subject.otherComputer architectureen
dc.subject.otherBachelor's thesesen
dc.titleBinary exploitation: Memory corruptionca
dc.typeinfo:eu-repo/semantics/bachelorThesisca

Fitxers

Paquet original

Mostrant 1 - 2 de 2
Carregant...
Miniatura
Nom:
codi179863.zip
Mida:
15.41 KB
Format:
ZIP file
Descripció:
Codi font
Carregant...
Miniatura
Nom:
179863.pdf
Mida:
2.96 MB
Format:
Adobe Portable Document Format
Descripció:
Memòria