Problem
us-16-Weston-Windows-10-Mitigation-Improvements
us-16-Weston-Windows-10-Mitigation-Improvements
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Percentage of Use<br />
Analysis:<br />
90<br />
80<br />
70<br />
Exploit Techniques used in Public Flash Exploits (2013-2015)<br />
60<br />
50<br />
40<br />
30<br />
20<br />
100%<br />
90%<br />
1<br />
10<br />
0<br />
Primitive :: Arbitrary<br />
Memory RW :: Flash<br />
Vector Length<br />
Corruption<br />
Bypass :: ASLR ::<br />
Predictable Region ::<br />
Heap Spraying<br />
Bypass :: ASLR ::<br />
Predictable Region<br />
Bypass :: DEP :: Code<br />
Reuse :: ROP :: Stack<br />
Pivot<br />
Exploit Technique<br />
Primitive :: Arbitrary Primitive :: Virtual Table<br />
Memory RW :: ByteArray Pointer Overwrite<br />
- DomainMemory<br />
Bypass :: DEP :: Code<br />
Reuse :: ROP :: Allocate<br />
Executable Code ::<br />
VirtualProtect<br />
80%<br />
70%<br />
60%<br />
50%<br />
2<br />
2<br />
1<br />
4<br />
1<br />
Use After Free<br />
Uninitialized Use<br />
Type Confusion<br />
40%<br />
30%<br />
20%<br />
1<br />
4<br />
6<br />
Stack Corruption<br />
Heap Corruption<br />
Arbitrary Corruption<br />
10%<br />
0%<br />
1<br />
1<br />
2013 2014 2015<br />
Exploit technique trend analysis drives new or improved mitigations