• DocumentCode
    240887
  • Title

    A-R Exploit: An Automatic ROP Exploit Based on Long Sequence

  • Author

    Chao Yang ; Tao Zheng ; Zhitian Lin

  • Author_Institution
    Software Inst., Nanjing Univ., Nanjing, China
  • fYear
    2014
  • fDate
    June 30 2014-July 2 2014
  • Firstpage
    50
  • Lastpage
    56
  • Abstract
    More attention has been paid to program security since ROP had been proposed. An ROP defence scheme based on detecting frequent set sequences was designed in 2009 and it was proved an useful way to defend most ROP attacks. However, this scheme was bypassed by Lgadget, which makes use of long ret sequences and was proposed by J Cao in 2013. Based on J Cao´s work, this paper improves the Lgadgets and designs a frame work automatically distributing gadgets addresses into the stack to trigger an ROP exploit. Our work includes turing-complete gadgets gathering, definition and compilation of upper level language, and automated linking and chaining of the gadgets in the stack. We demonstrate the viability and effectiveness of this kind of automatic exploit.
  • Keywords
    Turing machines; automatic programming; security of data; A-R exploit; ROP attacks; ROP defence scheme; automatic ROP exploit; frequent ret sequences; long sequence; program security; return-oriented programming; turing-complete gadget gathering; upper level language compilation; upper level language definition; Filling; Instruction sets; Joining processes; Libraries; Registers; Security; ROP; Turing-complete; automatic program; program security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Security and Reliability-Companion (SERE-C), 2014 IEEE Eighth International Conference on
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1109/SERE-C.2014.22
  • Filename
    6901640