Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables
Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X) protection. However, a general belief in the previous research is, systems deployed with address space randomization where the executables a...
Saved in:
Main Authors: | LIU, Limin, Han, JIN, GAO, Debin, JING, Jiwu, ZHA, Daren |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2007 https://ink.library.smu.edu.sg/context/sis_research/article/3006/viewcontent/trustcom11.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Revisiting Address Space Randomization
by: WANG, Zhi, et al.
Published: (2010) -
deRop: Removing Return-Oriented Programming from Malware
by: LU, Kangjie, et al.
Published: (2011) -
RopSteg: Program steganography with return oriented programming
by: LU, Kangjie, et al.
Published: (2014) -
Packed, Printable, and Polymorphic Return-Oriented Programming
by: LU, Kangjie, et al.
Published: (2011) -
On return oriented programming threats in Android runtime
by: RAJA, Akshaya Venkateswara, et al.
Published: (2017)