Return-oriented programming: Systems, languages, and applications

R Roemer, E Buchanan, H Shacham… - ACM Transactions on …, 2012 - dl.acm.org
We introduce return-oriented programming, a technique by which an attacker can induce
arbitrary behavior in a program whose control flow he has diverted, without injecting any …

Smashing the gadgets: Hindering return-oriented programming using in-place code randomization

V Pappas, M Polychronakis… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
The wide adoption of non-executable page protections in recent versions of popular
operating systems has given rise to attacks that employ return-oriented programming (ROP) …

Q: Exploit hardening made easy

EJ Schwartz, T Avgerinos, D Brumley - 20th USENIX Security …, 2011 - usenix.org
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕
X, a software defense that stops shellcode, by reusing instructions from large libraries such …

ROPdefender: A detection tool to defend against return-oriented programming attacks

L Davi, AR Sadeghi, M Winandy - … of the 6th ACM Symposium on …, 2011 - dl.acm.org
Modern runtime attacks increasingly make use of the powerful return-oriented programming
(ROP) attack techniques and principles such as recent attacks on Apple iPhone and Acrobat …

ILR: Where'd my gadgets go?

J Hiser, A Nguyen-Tuong, M Co, M Hall… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Through randomization of the memory space and the confinement of code to non-data
pages, computer security researchers have made a wide range of attacks against program …

Evaluating the effectiveness of current anti-ROP defenses

F Schuster, T Tendyck, J Pewny, A Maaß… - Research in Attacks …, 2014 - Springer
Recently, many defenses against the offensive technique of return-oriented programming
(ROP) have been developed. Prominently among them are kBouncer, ROPecker, and …

Branch regulation: Low-overhead protection from code reuse attacks

M Kayaalp, M Ozsoy, N Abu-Ghazaleh… - ACM SIGARCH …, 2012 - dl.acm.org
Code reuse attacks (CRAs) are recent security exploits that allow attackers to execute
arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump …

Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.

A Homescu, M Stewart, P Larsen, S Brunthaler… - WOOT, 2012 - usenix.org
Return-oriented programming (ROP) has gained a lot of popularity lately, as an attack
against currently implemented defenses in modern operating systems. Several kinds of ROP …

Control flow integrity based on lightweight encryption architecture

P Qiu, Y Lyu, J Zhang, D Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Control-flow integrity (CFI) plays a very important role in defending against code reuse
attacks by protecting the control flows of programs from being hijacked. However, previous …

Diversifying the software stack using randomized NOP insertion

T Jackson, A Homescu, S Crane, P Larsen… - Moving Target Defense …, 2013 - Springer
Software monoculture is a significant liability from a computer security perspective. Single
attacks can ripple through networks and affect large numbers of vulnerable systems. A …