Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Return-oriented programming: Systems, languages, and applications
We introduce return-oriented programming, a technique by which an attacker can induce
arbitrary behavior in a program whose control flow he has diverted, without injecting any …
arbitrary behavior in a program whose control flow he has diverted, without injecting any …
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
The wide adoption of non-executable page protections in recent versions of popular
operating systems has given rise to attacks that employ return-oriented programming (ROP) …
operating systems has given rise to attacks that employ return-oriented programming (ROP) …
Q: Exploit hardening made easy
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕
X, a software defense that stops shellcode, by reusing instructions from large libraries such …
X, a software defense that stops shellcode, by reusing instructions from large libraries such …
ROPdefender: A detection tool to defend against return-oriented programming attacks
Modern runtime attacks increasingly make use of the powerful return-oriented programming
(ROP) attack techniques and principles such as recent attacks on Apple iPhone and Acrobat …
(ROP) attack techniques and principles such as recent attacks on Apple iPhone and Acrobat …
ILR: Where'd my gadgets go?
Through randomization of the memory space and the confinement of code to non-data
pages, computer security researchers have made a wide range of attacks against program …
pages, computer security researchers have made a wide range of attacks against program …
Evaluating the effectiveness of current anti-ROP defenses
F Schuster, T Tendyck, J Pewny, A Maaß… - Research in Attacks …, 2014 - Springer
Recently, many defenses against the offensive technique of return-oriented programming
(ROP) have been developed. Prominently among them are kBouncer, ROPecker, and …
(ROP) have been developed. Prominently among them are kBouncer, ROPecker, and …
Branch regulation: Low-overhead protection from code reuse attacks
Code reuse attacks (CRAs) are recent security exploits that allow attackers to execute
arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump …
arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump …
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
Return-oriented programming (ROP) has gained a lot of popularity lately, as an attack
against currently implemented defenses in modern operating systems. Several kinds of ROP …
against currently implemented defenses in modern operating systems. Several kinds of ROP …
Control flow integrity based on lightweight encryption architecture
Control-flow integrity (CFI) plays a very important role in defending against code reuse
attacks by protecting the control flows of programs from being hijacked. However, previous …
attacks by protecting the control flows of programs from being hijacked. However, previous …
Diversifying the software stack using randomized NOP insertion
Software monoculture is a significant liability from a computer security perspective. Single
attacks can ripple through networks and affect large numbers of vulnerable systems. A …
attacks can ripple through networks and affect large numbers of vulnerable systems. A …