Packed, Printable, and Polymorphic Return-Oriented Programming
Return-oriented programming (ROP) is an attack that has been shown to be able to circumvent W ⊕ X protection. However, it was not clear if ROP can be made as powerful as non-ROP malicious code in other aspects, e.g., be packed to make static analysis difficult, be printable to evade non-ASCII filter...
Saved in:
Main Authors: | LU, Kangjie, Zou, Dabi, Wen, Weiping, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2004 https://ink.library.smu.edu.sg/context/sis_research/article/3003/viewcontent/raid11.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
deRop: Removing Return-Oriented Programming from Malware
by: LU, Kangjie, et al.
Published: (2011) -
RopSteg: Program steganography with return oriented programming
by: LU, Kangjie, et al.
Published: (2014) -
RopSteg: Program Steganography with Return Oriented Programming
by: Lu, Kangjie, et al.
Published: (2014) -
Software Watermarking using Return-Oriented Programming
by: Ma, Haoyu, et al.
Published: (2015) -
On return oriented programming threats in Android runtime
by: RAJA, Akshaya Venkateswara, et al.
Published: (2017)