This publication describes techniques aimed at detecting and preventing return-oriented programming (ROP) attacks. The techniques consist of a software adaptation which enables supplemental hardware, specifically a system on a chip (SoC), to chronologically log return (ret) addresses of pushed stack frames and compare those logged ret addresses to ret commands executed by a central processing unit (CPU) of a computing system. When the SoC determines that ret commands executed by the CPU have deviated from the logged ret addresses, then the SoC can take action to thwart a ROP attack
Hardware security features need to strike a careful balance between design intrusiveness and complet...
We consider the problem of detecting exploits based on return-oriented programming. In contrast to p...
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based o...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a se...
With the increased popularity of embedded devices, low-level programming languages like C and C++ ar...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
We consider the problem of detecting exploits based on return-oriented programming. In contrast to p...
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based o...
Return-oriented programming (ROP) is the most dangerous and most widely used technique to exploit so...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabi...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a se...
With the increased popularity of embedded devices, low-level programming languages like C and C++ ar...
Abstract Return-oriented programming (ROP) has become the primary exploitation technique for system ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
We consider the problem of detecting exploits based on return-oriented programming. In contrast to p...
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based o...