Abstract
Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of bitstream segment graphs for describing the structure of exploits on the example of the TIFF Jailbreak exploit for the Apple iPhone and iPod Touch with firmware 1.1.1.
Original language | English |
---|---|
Title of host publication | The Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008 |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 119-124 |
Number of pages | 6 |
ISBN (Print) | 978-0-7695-3275-2 |
DOIs | |
Publication status | Published - 2008 |
Event | 3rd International Multi-Conference on Computing in the Global Information Technology 2008 - Athens, Greece Duration: 27 Jul 2008 → 1 Aug 2008 Conference number: 3 |
Conference
Conference | 3rd International Multi-Conference on Computing in the Global Information Technology 2008 |
---|---|
Abbreviated title | ICCGI 2008 |
Country/Territory | Greece |
City | Athens |
Period | 27/07/08 → 1/08/08 |