DocumentCode :
2764108
Title :
ROP payload detection using speculative code execution
Author :
Polychronakis, Michalis ; Keromytis, Angelos D.
fYear :
2011
fDate :
18-19 Oct. 2011
Firstpage :
58
Lastpage :
65
Abstract :
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based on nonexecutable memory pages. In turn, attackers are increasingly relying on return-oriented programming (ROP) to bypass these protections. At the same time, existing detection techniques based on shellcode identification are oblivious to this new breed of exploits, since attack vectors may not contain binary code anymore. In this paper, we present a detection method for the identification of ROP payloads in arbitrary data such as network traffic or process memory buffers. Our technique speculatively drives the execution of code that already exists in the address space of a targeted process according to the scanned input data, and identifies the execution of valid ROP code at runtime. Our experimental evaluation demonstrates that our prototype implementation can detect a broad range of ROP exploits against Windows applications without false positives, while it can be easily integrated into existing defenses based on shell-code detection.
Keywords :
invasive software; ROP payload detection; Windows applications; attack vectors; code injection attack prevalence; network traffic; process memory buffers; return-oriented programming; shell-code detection; shellcode identification; speculative code execution; Detectors; Payloads; Programming; Prototypes; Runtime; Software; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on
Conference_Location :
Fajardo
Print_ISBN :
978-1-4673-0031-5
Type :
conf
DOI :
10.1109/MALWARE.2011.6112327
Filename :
6112327
Link To Document :
بازگشت