05.08.2016 Views

Problem

us-16-Weston-Windows-10-Mitigation-Improvements

us-16-Weston-Windows-10-Mitigation-Improvements

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Percentage of Use<br />

Analysis:<br />

90<br />

80<br />

70<br />

Exploit Techniques used in Public Flash Exploits (2013-2015)<br />

60<br />

50<br />

40<br />

30<br />

20<br />

100%<br />

90%<br />

1<br />

10<br />

0<br />

Primitive :: Arbitrary<br />

Memory RW :: Flash<br />

Vector Length<br />

Corruption<br />

Bypass :: ASLR ::<br />

Predictable Region ::<br />

Heap Spraying<br />

Bypass :: ASLR ::<br />

Predictable Region<br />

Bypass :: DEP :: Code<br />

Reuse :: ROP :: Stack<br />

Pivot<br />

Exploit Technique<br />

Primitive :: Arbitrary Primitive :: Virtual Table<br />

Memory RW :: ByteArray Pointer Overwrite<br />

- DomainMemory<br />

Bypass :: DEP :: Code<br />

Reuse :: ROP :: Allocate<br />

Executable Code ::<br />

VirtualProtect<br />

80%<br />

70%<br />

60%<br />

50%<br />

2<br />

2<br />

1<br />

4<br />

1<br />

Use After Free<br />

Uninitialized Use<br />

Type Confusion<br />

40%<br />

30%<br />

20%<br />

1<br />

4<br />

6<br />

Stack Corruption<br />

Heap Corruption<br />

Arbitrary Corruption<br />

10%<br />

0%<br />

1<br />

1<br />

2013 2014 2015<br />

Exploit technique trend analysis drives new or improved mitigations

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!