Detecting return oriented programming by examining positions of saved return addresses

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the recent years, return-oriented programming (ROP) has become the most widely used exploitation technique, achieving arbitrary code execution without injecting any code at all. This is possible by executing small sequences of assembly instructions found in binaries, also known as gadgets. Gadgets cannot do complex operations by themselves but when chained together, they can do any arbitrary operations theoretically. There were many mitigations proposed in the past but they either introduced large overhead or were too complex. In this paper, we propose a simple method of detecting ROP attacks by calculating distance between saved return addresses in the runtime stack. Examined ROP exploits which were published on the Internet resulted short distances between return addresses, which are gadget addresses, compared to that of normal control flow of the program. Our method can be used as a stand-alone tool or part of sequential checks in existing tools. © 2013 Springer Science+Business Media.

Cite

CITATION STYLE

APA

Min, J. W., Jung, S. M., & Chung, T. M. (2013). Detecting return oriented programming by examining positions of saved return addresses. In Lecture Notes in Electrical Engineering (Vol. 214 LNEE, pp. 791–798). https://doi.org/10.1007/978-94-007-5857-5_85

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free