Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive target applications to perform arbitrary unintended operations by constructing a gadget chain reusing existing small code sequences (gadget-s). Existing defense mechanisms either only handle specific types of gadgets, require access to source code and/or a customized compiler, break the integrity of the binary code, or suffer from high performance overhead. In this paper, we present a novel system, ROPecker, to efficiently and effectively defend against ROP attacks without relying on any other side information (e.g., source code and compiler support) or binary rewriting. ROPecker detects an ROP attack at run-time by checking the presence of a s...
Code-reuse attacks such as return-oriented programming (ROP) pose a severe threat to modern software...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Abstract—Return-Oriented Programming (ROP) is a sophis-ticated exploitation technique that is able t...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
With the increased popularity of embedded devices, low-level programming languages like C and C++ ar...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a se...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...
Code-reuse attacks such as return-oriented programming (ROP) pose a severe threat to modern software...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Abstract—Return-Oriented Programming (ROP) is a sophis-ticated exploitation technique that is able t...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
With the increased popularity of embedded devices, low-level programming languages like C and C++ ar...
This publication describes techniques aimed at detecting and preventing return-oriented programming ...
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a se...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...
Code-reuse attacks such as return-oriented programming (ROP) pose a severe threat to modern software...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...