We show that on the x86 it is possible to mount a return-oriented programming attack without using any return instructions. Our new attack instead makes use of certain instruction sequences that behave like a return; we show that these sequences occur with sufficient frequency in large Linux libraries to allow creation of a Turing-complete gadget set. Because it does not make use of return instructions, our new attack has negative implications for two recently proposed classes of defense against return-oriented programming: those that detect the too-frequent use of returns in the instruction stream, and those that detect violations of the last-in, first-out invariant that is normally maintained for the return-address stack.
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer sy...
Abstract. Since the introduction of return-oriented programming, increasingly complex defenses and s...
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programmi...
This thesis investigates the pervasiveness and widespread applicability of "return-oriented programm...
Abstract—Since the day it was proposed, return-oriented programming has shown to be an effective and...
We present new techniques that allow a return-into-libc attack to be mounted on x86 executables that...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
This book provides an in-depth look at return-oriented programming attacks. It explores several conv...
Abstract. Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. In this att...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
none2noAttackers able to compromise the memory of a target machine can change its behavior and usual...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer sy...
Abstract. Since the introduction of return-oriented programming, increasingly complex defenses and s...
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programmi...
This thesis investigates the pervasiveness and widespread applicability of "return-oriented programm...
Abstract—Since the day it was proposed, return-oriented programming has shown to be an effective and...
We present new techniques that allow a return-into-libc attack to be mounted on x86 executables that...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
This book provides an in-depth look at return-oriented programming attacks. It explores several conv...
Abstract. Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. In this att...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
none2noAttackers able to compromise the memory of a target machine can change its behavior and usual...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer sy...
Abstract. Since the introduction of return-oriented programming, increasingly complex defenses and s...