Title :
Return-Oriented Programming
Author :
Prandini, Marco ; Ramilli, Marco
Author_Institution :
Univ. of Bologna, Bologna, Italy
Abstract :
Attackers able to compromise the memory of a target machine can change its behavior and usually gain complete control over it. Despite the ingenious prevention and protection mechanisms that have been implemented in modern operating systems, memory corruption attacks still account for a big share of the security breaches afflicting software systems. This article describes a growing attack trend that uses return-oriented programming (ROP) techniques to bypass the most common memory protection systems.
Keywords :
operating systems (computers); security of data; storage management; ROP techniques; memory corruption attacks; memory protection systems; operating systems; prevention mechanisms; protection mechanisms; return-oriented programming; software systems; Buffer overflows; Computer crime; Computer security; Operating systems; Programming; ROP; attack; buffer overflows; operating systems; return-oriented programming;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2012.152