2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021
DOI: 10.1109/dsn48987.2021.00064
|View full text |Cite
|
Sign up to set email alerts
|

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 58 publications
0
4
0
Order By: Relevance
“…In more detail, we look up or introduce suitable gadgets in the target DLL for one instruction at a time, and wrap constructs like conditional transfers and API calls with templates. Promoting stack variables to global storage in the design sidesteps difficulties that would emerge here and that are known in the ROP practice, as in general translating stack manipulations may require non-trivial program analyses or the use of a parallel stack [4]. While implementing a fully automated translation goes beyond the scope of proving the effectiveness of Rope in avoiding detection, we believe it is a realistic goal also in light of the recent advances in ROP-based program obfuscation [4,32].…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…In more detail, we look up or introduce suitable gadgets in the target DLL for one instruction at a time, and wrap constructs like conditional transfers and API calls with templates. Promoting stack variables to global storage in the design sidesteps difficulties that would emerge here and that are known in the ROP practice, as in general translating stack manipulations may require non-trivial program analyses or the use of a parallel stack [4]. While implementing a fully automated translation goes beyond the scope of proving the effectiveness of Rope in avoiding detection, we believe it is a realistic goal also in light of the recent advances in ROP-based program obfuscation [4,32].…”
Section: Methodsmentioning
confidence: 99%
“…Hence, we make the Rope loader create another transacted file on a signed Microsoft DLL, add to it any required gadgets using code caves, and embed also the bootstrap component (as a ROP chain or even as a shellcode placed in RX caves) in it 4 . Then we create a section object and duplicate the handle to it.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations