Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Motivation
Is there something else that could explain this drop in reports?
0-Day private market
Black market
Bounty programs
Pwn2Own 2012:
"... But the other one, a memory corruption flaw in IE's protected mode sandbox, VUPEN will keep for itself and its customers (NATO governments and partners) ..."
Vendors started paying for zero-days
Other companies selling zero-days:
Selling on black markets is also lucrative
21/32
22/32
23/32
Exploit analysis
Exploit breakdown
Vulnerability analysis
Vulnerability breakdown
20/32
No more format strings
Number of memory errors are dropping
The heap is difficult to exploit
Exploitation is getting harder
15/32
Heap
Stack
16/32
17/32
18/32
Memory errors will remain a serious threat
What can we expect in the future?
Fewer reports
Fortunately, exploitation is getting harder
Unfortunately, also less public
C usage
Percentages
Non-control data
Focus on damage control
"Non-control-data attacks are realistic threats" (2005)
(Recent) Advances in Intrusion Detection was actually very well chosen
Exim attack (2010)
But also look at preventing privilege escalation
The memory error:
Today's cyber bullet, tomorrow's cruise missile?
Focus on detecting non-control data attacks
24/32
As long as we find vulnerabilities, memory errors will be among them
More attacks in the future?
31/32
29/32
Memory errors are endemic in C-like programs
32/32
27/32
30/32
20 years of research on memory errors:
http://malware-experiments.few.vu.nl/
1
'Classic buffer overflow' still in top 3 of CWE SANS top 25
Victor van der Veen, Nitish Dutt-Sharma, Lorenzo Cavallaro, Herbert Bos
1,2
1
1,2
1
Will memory errors remain a significant threat?
Do we need renewed/different research efforts?
1
2
Contributions
1
2
3/31
2/31