2019
DOI: 10.1134/s0361768819080061
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Analyzing Code-Reuse Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Hereafter, we perform gadget classification, i.e., we determine semantics for every found gadget. Single gadget can sat- [42].…”
Section: Gadget Catalogingmentioning
confidence: 99%
See 2 more Smart Citations
“…Hereafter, we perform gadget classification, i.e., we determine semantics for every found gadget. Single gadget can sat- [42].…”
Section: Gadget Catalogingmentioning
confidence: 99%
“…For the exact classification, formal verification must be performed [22]. We partially mitigate it by adding specific input data for corner cases [42] A. Gadget Preprocessing Gadget catalog does not represent gadgets that load multiple values from the stack to registers at once, e.g., pop rax ; pop rbx ; pop rdi ; ret 1 . We derive these semantics by combining several gadgets from the catalog.…”
Section: Gadget Catalogingmentioning
confidence: 99%
See 1 more Smart Citation
“…In turn, the ROP chain calls the VirtualProtect function to make the stack executable, and transfer control to the regular shellcode located up the stack. A detailed description of this method and the Figure can be found in [60].…”
Section: Canary Bypassmentioning
confidence: 99%
“…In order to place a ROP chain on stack, it is convenient to introduce the concept of a gadget frame [60] similar to the x86 stack frame. A chain of gadgets is assembled from the frames.…”
Section: Gadget Framementioning
confidence: 99%