In recent years, researchers have come up with proof of concepts of seemingly benign applications such as InstaStock and Jekyll that remain dormant until triggered by an attacker-crafted condition, which activates a malicious behavior, eluding code review and signing mechanisms. In this paper, we make a step forward by describing a stealthy injection vector design approach based on Return Oriented Programming (ROP) code reuse that provides two main novel features: 1) the ability to defer the specification of the malicious behavior until the attack is struck, allowing fine-grained targeting of the malware and reuse of the same infection vector for delivering multiple payloads over time; 2) the ability to conceal the ROP chain that specifies ...
Software obfuscation plays a crucial role in protecting intellectual property in software from rever...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
In recent years, researchers have come up with proof of concepts of seemingly benign applications su...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that ar...
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based o...
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a se...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Abstract Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP)...
Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP) is still...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
We consider the problem of detecting exploits based on return-oriented programming. In contrast to p...
Software obfuscation plays a crucial role in protecting intellectual property in software from rever...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...
In recent years, researchers have come up with proof of concepts of seemingly benign applications su...
The downside of current polymorphism techniques lies to the fact that they require a writeable code ...
Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that ar...
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based o...
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a se...
Return-oriented programming (ROP) offers a robust attack technique that has, not surprisingly, been ...
Return-Oriented Programming (ROP) is a technique that enables an adversary to construct malicious pr...
Return-oriented programming (ROP) has become the primary exploitation technique for system compromis...
Abstract Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP)...
Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP) is still...
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive ta...
We consider the problem of detecting exploits based on return-oriented programming. In contrast to p...
Software obfuscation plays a crucial role in protecting intellectual property in software from rever...
Attackers able to compromise the memory of a target machine can change its behavior and usually gain...
Return-oriented programming (ROP) is a technique that enables an adversary to construct malicious pr...