2023
DOI: 10.34190/iccws.18.1.968
|View full text |Cite
|
Sign up to set email alerts
|

Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers

Abstract: The presence of instructions within executable programs is what makes the binaries executable.  However, attackers leverage on the same to achieve some form of Control Flow Hijacking (CFH).  Such code re-use attacks have also been found to lead to Denial of Service (DoS).  An example of code re-use attack is Return Oriented Programming (ROP) which is caused by passing input crafted as chained sequences of instructions that are already existing as subroutines in the target program.  The instructions are called … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 3 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?