Return-oriented programming (ROP) is an attack that has been shown to be able to circumvent W+X protection. However, it was not clear if ROP can be made as powerful as non-ROP malicious code in other aspects, e.g., be packed to make static analysis difficult, be printable to evade non-ASCII filtering, be polymorphic to evade signature-based detection, etc. Research in these potential advances in ROP is important in designing counter-measures. In this paper, we show that ROP code could be packed, printable, and polymorphic. We demonstrate this by proposing a packer that produces printable and polymorphic ROP code. It works on virtually any unpacked ROP code and produces packed code that is self-contained. We implement our packer and demonstr...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). ...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...
Abstract. Return-oriented programming (ROP) is an attack that has been shown to be able to circumven...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Abstract—The wide adoption of non-executable page protec-tions in recent versions of popular operati...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
The wide adoption of non-executable page protections in recent versions of popular operating systems...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that ar...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). ...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...
Abstract. Return-oriented programming (ROP) is an attack that has been shown to be able to circumven...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Abstract—The wide adoption of non-executable page protec-tions in recent versions of popular operati...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software de...
The wide adoption of non-executable page protections in recent versions of popular operating systems...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that ar...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
We propose a novel dynamic software watermarking design based on Return-Oriented Programming (ROP). ...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...