2013
DOI: 10.1002/sec.693
|View full text |Cite
|
Sign up to set email alerts
|

Defending return‐oriented programming based on virtualization techniques

Abstract: Over the past few years, return‐oriented programming (ROP) has drawn great attention of both academia and industry. Because of its Turing completeness, ROP reuses short instruction sequences already present in the victim program's address space to perform arbitrary computation. Hence, it can successfully bypass state‐of‐the‐art code integrity check mechanisms. In this paper, we look into using virtualization technologies to defeat return‐oriented programming. We design and implement HyperCropII, a virtualizati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 31 publications
(20 reference statements)
0
1
0
Order By: Relevance
“…A defense to ROP is presented in [5], in which they continuously analyze the stack, looking for possible ROP attacks and then quarantine for further investigation. They use a key feature of ROP that requires many addresses in the range of a program and its libraries to search for such attacks.…”
Section: Return Oriented Programming Attack On Hypervisorsmentioning
confidence: 99%
“…A defense to ROP is presented in [5], in which they continuously analyze the stack, looking for possible ROP attacks and then quarantine for further investigation. They use a key feature of ROP that requires many addresses in the range of a program and its libraries to search for such attacks.…”
Section: Return Oriented Programming Attack On Hypervisorsmentioning
confidence: 99%