diff --git a/work/01paper.pdf b/work/01paper.pdf index f8e7311..2adc218 100644 Binary files a/work/01paper.pdf and b/work/01paper.pdf differ diff --git a/work/01paper.tex b/work/01paper.tex index fbd454b..b2773c6 100644 --- a/work/01paper.tex +++ b/work/01paper.tex @@ -77,6 +77,8 @@ vulnerabilities or at least application crashes. \subsection{Background}\label{ref:background} +\subsubsection{Technical Details} + Exploitation of buffer overflow vulnerabilities almost always works by overriding the return address in the current stack frame, so when the `ret` instruction is executed, an attacker controlled address is moved into the @@ -86,6 +88,8 @@ that, if a linked function is called, an attacker controlled function is called instead, or (in C++) overriding the vtable where the pointers to an object's methods are stored. +\subsubsection{Implications} + \subsection{Concept and Methods}\label{ref:concept} \subsubsection{Runtime Bounds Checks} @@ -153,9 +157,13 @@ circumvent the w\^{}x protection. \subsubsection{Ineffective or Inefficient} +Methods that have been shown to be ineffective (e.g. can be circumvented easily) +or inefficient (to much runtime overhead)... + \subsubsection{State of the Art} -text +What techniques are currently used? + \section{Conclusion and Outlook}\label{ref:conclusion}