Mahmoud Said Elsayed Abdallah and AYMAN M. EL-ZOGHBY
Adv. Artif. Intell. Mach. Learn., 1 (2):108-148
Mahmoud Said Elsayed Abdallah : Dr.
AYMAN M. EL-ZOGHBY : Mr.
Article History: Received on: 10-Jun-24, Accepted on: 27-Aug-24, Published on: 11-Nov-24
Corresponding Author: Mahmoud Said Elsayed Abdallah
Email: Eng.Mahmoud101@gmail.com
Citation: Mahmoud Said Elsayed Abdallah (2024). Overview of the Code-Reuse Attacks Mitigations, and Evaluation using SMAA-2 Approach. Adv. Artif. Intell. Mach. Learn., 1 (2 ):108-148
Exploiting modern software requires
sophisticated attack vectors in order to bypass software protection mechanisms.
Code-reuse Attacks (CRAs) is a widely used approach to attack modern software
even after applying memory protection defenses. Using the program’s own code
and manipulating data and code are possible because of the underlying
vulnerabilities in the software codes or design. This paper covers the
foundation of the memory-based attacks and provides an extensive overview of
the memory safety issues and exploitation methods, control flow attacks
foundation, and code-reuse attack categories. Focusing on the differences
between the different methods employed to mitigate code-reused attacks. We
apply an analysis technique for the covered CRAs in order to assist in the
ranking and evaluation process. The decision-making technique of choice is
SMAA-2, which is employed in the analysis of the mitigation defenses and
techniques. This novel approach in the evaluation of the CRAs mitigations helps
Decision Makers (DM) in the selection process of certain CRA techniques over
others.