Proceedings 21st International Conference on Distributed Computing Systems
DOI: 10.1109/icdsc.2001.918971
|View full text |Cite
|
Sign up to set email alerts
|

RAD: a compile-time solution to buffer overflow attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 105 publications
(38 citation statements)
references
References 1 publication
0
38
0
Order By: Relevance
“…Under such situation, researchers have developed several preventions which relied upon particular attributes of ROP attack, such as the frequency of ret instructions [6,7] or reliance on the protection of control flow data on the stack (e.g., return address) [8,9,10,11,12]. However, recent advancement in ROP has revealed that it need not rely on the stack [13] or the ret instructions to govern control flow [14], thus making those defenses ineffective.…”
Section: Introductionmentioning
confidence: 99%
“…Under such situation, researchers have developed several preventions which relied upon particular attributes of ROP attack, such as the frequency of ret instructions [6,7] or reliance on the protection of control flow data on the stack (e.g., return address) [8,9,10,11,12]. However, recent advancement in ROP has revealed that it need not rely on the stack [13] or the ret instructions to govern control flow [14], thus making those defenses ineffective.…”
Section: Introductionmentioning
confidence: 99%
“…ROPDefender [7] rewrites binaries to maintain a shadow stack in order to verify each return address. This builds upon previous work in stack protection, including other shadow stack system [8,9,10], as well as canary-based stack protection such as StackGuard [22]. Systems like DROP [4] and DynIMA [5] can detect a ROPbased attack based on the short length of ROP gadgets, which results in a very high frequency of ret instructions being encountered.…”
Section: Code-reuse Attacksmentioning
confidence: 99%
“…In this technique, so-called gadgets (small snippets of code ending in ret) are weaved together in arbitrary ways to achieve Turing complete computation without code injection. In response to this threat, researchers developed defenses which relied upon particular attributes of this attack, such as the the frequency of ret instructions [4,5] or reliance on the stack [6,7,8,9,10]. Unfortunately, recent evidence has revealed that code-reuse attacks need not rely on the stack or the ret instruction to govern control flow, negating these defenses [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, ROPDefender [22] rewrites existing binaries to record a separate shadow stack which is used to verify that each return address is valid; this prevents return-based attacks, including both ROP and RILC. Other systems also make use of a shadow stack, either in hardware or software, and can be used to similarly enforce stack integrity [23][24][25].…”
Section: Related Workmentioning
confidence: 99%