Prevent kernel return-oriented programming attacks using hardware virtualization

6Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attack is great challenge to existing defenses because attackers have system privilege, little prerequisite to mount attacks, and the disability of existing countermeasures against runtime attacks. A method preventing kernel return-oriented programming attack is proposed, which creates a separated secret address space for control data taking advantage of VMM architecture. The secret address space is implemented as a shadow stack on the same host with the target OS facilited by hardware virtualization techniques. The experience result shows the performance overhead in our implementation is about 10% and acceptable in practical. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Tian, S., He, Y., & Ding, B. (2012). Prevent kernel return-oriented programming attacks using hardware virtualization. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7232 LNCS, pp. 289–300). https://doi.org/10.1007/978-3-642-29101-2_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free