Describing Data Format Exploits Using Bitstream Segment Graphs

Michael Hartle, Daniel Schumann, Arsene Botchak, Erik Tews, Max Mühlhäuser

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
    8 Downloads (Pure)

    Abstract

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of bitstream segment graphs for describing the structure of exploits on the example of the TIFF Jailbreak exploit for the Apple iPhone and iPod Touch with firmware 1.1.1.
    Original languageEnglish
    Title of host publicationThe Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008
    Place of PublicationPiscataway, NJ
    PublisherIEEE
    Pages119-124
    Number of pages6
    ISBN (Print)978-0-7695-3275-2
    DOIs
    Publication statusPublished - 2008
    Event3rd International Multi-Conference on Computing in the Global Information Technology 2008 - Athens, Greece
    Duration: 27 Jul 20081 Aug 2008
    Conference number: 3

    Conference

    Conference3rd International Multi-Conference on Computing in the Global Information Technology 2008
    Abbreviated titleICCGI 2008
    Country/TerritoryGreece
    CityAthens
    Period27/07/081/08/08

    Fingerprint

    Dive into the research topics of 'Describing Data Format Exploits Using Bitstream Segment Graphs'. Together they form a unique fingerprint.

    Cite this