ROPecker: A generic and practical approach for defending against ROP attack

Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng - 2014 - ink.library.smu.edu.sg
Abstract Return-Oriented Programming (ROP) is a sophisticated exploitation technique that
is able to drive target applications to perform arbitrary unintended operations by constructing …

[PDF][PDF] kBouncer: Efficient and transparent ROP mitigation

V Pappas - Apr, 2012 - people.csail.mit.edu
The wide adoption of non-executable page protections in recent versions of popular
operating systems has given rise to attacks that employ return-oriented programming (ROP) …

Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.

A Homescu, M Stewart, P Larsen, S Brunthaler… - WOOT, 2012 - usenix.org
Return-oriented programming (ROP) has gained a lot of popularity lately, as an attack
against currently implemented defenses in modern operating systems. Several kinds of ROP …

Size Does Matter: Why Using {Gadget-Chain} Length to Prevent {Code-Reuse} Attacks is Hard

E Göktaş, E Athanasopoulos, M Polychronakis… - 23rd USENIX Security …, 2014 - usenix.org
Code-reuse attacks based on return oriented programming are among the most popular
exploitation techniques used by attackers today. Few practical defenses are able to stop …

Transparent {ROP} exploit mitigation using indirect branch tracing

V Pappas, M Polychronakis, AD Keromytis - 22nd USENIX Security …, 2013 - usenix.org
Return-oriented programming (ROP) has become the primary exploitation technique for
system compromise in the presence of non-executable page protections. ROP exploits are …

Evaluating the effectiveness of current anti-ROP defenses

F Schuster, T Tendyck, J Pewny, A Maaß… - Research in Attacks …, 2014 - Springer
Recently, many defenses against the offensive technique of return-oriented programming
(ROP) have been developed. Prominently among them are kBouncer, ROPecker, and …

DROP: Detecting return-oriented programming malicious code

P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie - … Systems Security: 5th …, 2009 - Springer
Abstract Return-Oriented Programming (ROP) is a new technique that helps the attacker
construct malicious code mounted on x86/SPARC executables without any function call at …

ROPdefender: A detection tool to defend against return-oriented programming attacks

L Davi, AR Sadeghi, M Winandy - … of the 6th ACM Symposium on …, 2011 - dl.acm.org
Modern runtime attacks increasingly make use of the powerful return-oriented programming
(ROP) attack techniques and principles such as recent attacks on Apple iPhone and Acrobat …

Smashing the gadgets: Hindering return-oriented programming using in-place code randomization

V Pappas, M Polychronakis… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
The wide adoption of non-executable page protections in recent versions of popular
operating systems has given rise to attacks that employ return-oriented programming (ROP) …

[PDF][PDF] Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.

L Davi, C Liebchen, AR Sadeghi, KZ Snow… - …, 2015 - download.hrz.tu-darmstadt.de
Until recently, it was widely believed that code randomization (such as fine-grained ASLR)
can effectively mitigate code reuse attacks. However, a recent attack strategy, dubbed just-in …