2019
DOI: 10.1109/access.2019.2937585
|View full text |Cite
|
Sign up to set email alerts
|

ARG: Automatic ROP Chains Generation

Abstract: Return Oriented Programming (ROP) chains attack has been widely used to bypass Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) protection. However, the generation technology for ROP chains is still in a state of manual coding. While, current techniques for automatically generating ROP chains are still insufficiently researched and have few successful applications. On the other hand, the existing methods are based on using Intermediate Language (IL) which is in order to translate t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…In response to the security threat posed by code reuse attacks, extensive research has been conducted on defense methods against such attacks. These include CRA defense methods based on randomization [ 15 , 16 ], protection methods based on CFI protection [ 17 ], and Data Execution Protection (DEP) [ 18 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In response to the security threat posed by code reuse attacks, extensive research has been conducted on defense methods against such attacks. These include CRA defense methods based on randomization [ 15 , 16 ], protection methods based on CFI protection [ 17 ], and Data Execution Protection (DEP) [ 18 ].…”
Section: Related Workmentioning
confidence: 99%
“…DEP adopts a protection strategy that prohibits programs from simultaneously writing to and executing the same memory section, in order to prevent attackers from executing malicious code injected by the attackers. However, this defense method is vulnerable to bypassing through ROP and JOP attacks [ 18 ]. Randomization techniques are an effective defense against CRA attacks as they randomize code segments, data segments, and control flow paths within a program.…”
Section: Related Workmentioning
confidence: 99%
“…A memory corruption attack exploits a software bug to corrupt the content of a memory location, which contains important data structures, such as data and code pointers. The set of attacks that modify code pointers to change the control flow of the victim program is called control-flow hijacking attacks, such as code injection attacks, return-oriented programming (ROP) [31,56,66], and jumporiented programming (JOP) [11,16].…”
Section: Background 21 Memory Corruption Vulnerabilitiesmentioning
confidence: 99%
“…These mitigations include stack canaries [19], data execution prevention [64], address space layout randomization (ASLR) [1,47], and kernel address space layout randomization (kASLR) [21]. Even though these mechanisms make memory corruption attacks more difficult, several advanced attacks [11,16,31,56,66] and various data disclosure attacks [29,59] still have the potential to bypass these memory protection mechanisms, and show that none of the existing systems are impenetrable.…”
Section: Background 21 Memory Corruption Vulnerabilitiesmentioning
confidence: 99%
“…Recent cyber-attack techniques, especially control flow hijacking, are highly complex and numbers of variants of the techniques have been developed [10]. Furthermore, there are studies that automatically produce exploit codes for buffer overflows [11], ROP chains [12], heap overflows [13], etc.…”
Section: Related Workmentioning
confidence: 99%