April 2, 2024, 7:11 p.m. | Chris Porter, Sharjeel Khan, Kangqi Ni, Santosh Pande

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.00196v1 Announce Type: new
Abstract: Software debloating can effectively thwart certain code reuse attacks by reducing attack surfaces to break gadget chains. Approaches based on static analysis enable a reduced set of functions reachable at a callsite for execution by leveraging static properties of the callgraph. This achieves low runtime overhead, but the function set is conservatively computed, negatively affecting reduction. In contrast, approaches based on machine learning (ML) have much better precision and can sharply reduce function sets, leading …

analysis application arxiv attack attacks attack surfaces can code code reuse cs.cr effectively enable functions gadget low machine machine learning prediction reuse runtime software static analysis

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC