| 
			 
Instruction-set Randomization (ISR)
  
Instruction-set randomization (ISR) is a technique based on randomizing the
"language" understood by a system to protect it from code-injection attacks.
Such attacks were used by many computer worms in the past, but still pose a
threat as it was confirmed by the recent Conficker worm outbreak, and the latest
exploits targeting some of Adobe's most popular products. We created a tool 
that offers a fast and practical implementation of ISR that
(more...)
 
Defending Against Code-Reuse Attacks
  
The wide adoption of protection mechanisms such as non-executable pages (W^X)
and Data Execution Prevention (DEP), has given rise to a new type of attacks,
known as code-reuse attacks, which achieve arbitrary code execution without the
injection of any attacker-supplied code. In this project, we aim to hinder
code-reuse attacks by breaking the assumptions that the attacker can make about
the process code image.
(more ...)
 
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
 
Software failures in server applications are a significant problem for
preserving system availability. Rescue points are a known mechanism for
recovering software from unknown faults. REASSURE is a self-containted system
that uses the Pin DBI framework to apply
(more...)
 
Older Projects
You can find older projects of the group here.
 
			 |