Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables
Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X) protection. However, a general belief in the previous research is, systems deployed with address space randomization where the executables a...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2007 https://ink.library.smu.edu.sg/context/sis_research/article/3006/viewcontent/trustcom11.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-3006 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-30062014-02-04T11:54:04Z Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables LIU, Limin Han, JIN GAO, Debin JING, Jiwu ZHA, Daren Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X) protection. However, a general belief in the previous research is, systems deployed with address space randomization where the executables are also randomized at run-time are able to defend against return-oriented programming, as the addresses of all instructions are randomized. In this paper, we show that due to the weakness of current address space randomization technique, there are still ways of launching return-oriented programming attacks against those well-protected systems efficiently. We demonstrate and evaluate our attacks with existing typical web server applications and discuss possible methods of mitigating such threats. 2011-11-16T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/2007 info:doi/10.1109/TrustCom.2011.9 https://ink.library.smu.edu.sg/context/sis_research/article/3006/viewcontent/trustcom11.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University address space randomization position independent executable return-oriented programming Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
address space randomization position independent executable return-oriented programming Information Security |
spellingShingle |
address space randomization position independent executable return-oriented programming Information Security LIU, Limin Han, JIN GAO, Debin JING, Jiwu ZHA, Daren Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables |
description |
Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X) protection. However, a general belief in the previous research is, systems deployed with address space randomization where the executables are also randomized at run-time are able to defend against return-oriented programming, as the addresses of all instructions are randomized. In this paper, we show that due to the weakness of current address space randomization technique, there are still ways of launching return-oriented programming attacks against those well-protected systems efficiently. We demonstrate and evaluate our attacks with existing typical web server applications and discuss possible methods of mitigating such threats. |
format |
text |
author |
LIU, Limin Han, JIN GAO, Debin JING, Jiwu ZHA, Daren |
author_facet |
LIU, Limin Han, JIN GAO, Debin JING, Jiwu ZHA, Daren |
author_sort |
LIU, Limin |
title |
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables |
title_short |
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables |
title_full |
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables |
title_fullStr |
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables |
title_full_unstemmed |
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables |
title_sort |
launching return-oriented programming attacks against randomized relocatable executables |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/2007 https://ink.library.smu.edu.sg/context/sis_research/article/3006/viewcontent/trustcom11.pdf |
_version_ |
1770571772074131456 |