2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.374
|View full text |Cite
|
Sign up to set email alerts
|

Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Shacham further generalized this attack technique as return-oriented programming (ROP) [62]. Similar to control-flow-hijacking attacks that overwrite pointers [62], [11], [44], [30], [58], memory safety violations can also be abused in data-only attacks [57], [36].…”
Section: Runtime Attacksmentioning
confidence: 99%
“…Shacham further generalized this attack technique as return-oriented programming (ROP) [62]. Similar to control-flow-hijacking attacks that overwrite pointers [62], [11], [44], [30], [58], memory safety violations can also be abused in data-only attacks [57], [36].…”
Section: Runtime Attacksmentioning
confidence: 99%
“…By chaining multiple gadgets, it is generally possible to build arbitrary exploits. In addition to such control-flow-hijacking that overwrite pointers [83], [11], [54], [31], [77], data-only attacks [74], [42] can also violate memory safety.…”
Section: Runtime Attacksmentioning
confidence: 99%
“…Lan et al [78] propose a loop-oriented programming (LOP) method that uses whole functions as gadgets. This method was developed to bypass coarse-grained CFI and the shadow stack [79].…”
Section: Reuse Of Functionsmentioning
confidence: 99%