Pre-Exploit Detection and Mitigation Techniques
Signature-based defensive stack are bypassed time and again. This is especially true with exploit mitigations, and Return-Oriented Programming (ROP) in particular. In short, current defenses target obsolete offensive techniques. Anti-exploit solutions need to disrupt early in the stages of exploitation to maintain an advantage.
Next generation exploit detection must stop the exploitation patterns in earliest stages of the process to maintain the advantage over the adversary. Endgame’s Hardware Assisted Control Flow Integrity (HA-CFI) stops adversaries before any code is executed.
In this webinar, Cody Pierce, Sr. Director of Vulnerability Research discusses:
- The challenges with exploit detection
- Exploit prevention framework and mitigation techniques
- Endgame’s approach to pre-exploit detection