DocumentCode :
240887
Title :
A-R Exploit: An Automatic ROP Exploit Based on Long Sequence
Author :
Chao Yang ; Tao Zheng ; Zhitian Lin
Author_Institution :
Software Inst., Nanjing Univ., Nanjing, China
fYear :
2014
fDate :
June 30 2014-July 2 2014
Firstpage :
50
Lastpage :
56
Abstract :
More attention has been paid to program security since ROP had been proposed. An ROP defence scheme based on detecting frequent set sequences was designed in 2009 and it was proved an useful way to defend most ROP attacks. However, this scheme was bypassed by Lgadget, which makes use of long ret sequences and was proposed by J Cao in 2013. Based on J Cao´s work, this paper improves the Lgadgets and designs a frame work automatically distributing gadgets addresses into the stack to trigger an ROP exploit. Our work includes turing-complete gadgets gathering, definition and compilation of upper level language, and automated linking and chaining of the gadgets in the stack. We demonstrate the viability and effectiveness of this kind of automatic exploit.
Keywords :
Turing machines; automatic programming; security of data; A-R exploit; ROP attacks; ROP defence scheme; automatic ROP exploit; frequent ret sequences; long sequence; program security; return-oriented programming; turing-complete gadget gathering; upper level language compilation; upper level language definition; Filling; Instruction sets; Joining processes; Libraries; Registers; Security; ROP; Turing-complete; automatic program; program security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Security and Reliability-Companion (SERE-C), 2014 IEEE Eighth International Conference on
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1109/SERE-C.2014.22
Filename :
6901640
Link To Document :
بازگشت