نتایج جستجو برای: return oriented programming

تعداد نتایج: 509816  

2011
Mathias Payer

The protection landscape is changing and exploits are getting more and more sophisticated. Exploit generation toolkits can be used to construct exploits for specific applications using well-defined algorithms. We present such an algorithm for leveraging format strings and introduce string oriented programming. String oriented programming takes format string exploits to the next level and turns ...

Journal: :IEEE Access 2022

An increasing number of embedded systems include dedicated neural hardware. To benefit from this specialized hardware, deep learning techniques to discover malware on are needed. This effort evaluated candidate machine detection for distinguishing exploited non-exploited RISC-V program behavior using execution traces. We first developed a dataset traces containing Return Oriented Programming (R...

Journal: :isecure, the isc international journal of information security 0
a. a sadeghi f. aminmansour h. r. shahriari

code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. a large number of practical and non-practical defenses have been proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. however, a usual aspect among them is to consider the common behavio...

Journal: :CoRR 2002
R. Rothenstein Klaus Pawelzik

We present a novel microscopic stock market model consisting of a large number of random agents modeling traders in a market. Each agent is characterized by a set of parameters that serve to make iterated predictions of two successive returns. The future price is determined according to the offer and the demand of all agents. The system evolves by redistributing the capital among the agents in ...

2014
Xiaochen Sun Fei Hu

As an effective way of decreasing production cost, remanufacturing has attracted more and more attention from firms. However, it also brings many difficulties to firms, especial when firms remanufacture products which they produce. A primary problem for the case is how to acquire the used product sold by the firm itself. In this paper, we consider a return compensation policy for acquiring used...

2015
Giorgos Poulios Christoforos Ntantogian Christos Xenakis

The downside of current polymorphism techniques lies to the fact that they require a writeable code section, either marked as such in the corresponding Portable Executable (PE) section header, or by changing permissions during runtime. Both approaches are identified by AV software as alarming characteristics and/or behavior, since they are rarely found in benign PEs unless they are packed. In t...

2013
Richard Skowyra Kelly Casteel Hamed Okhravi Nickolai Zeldovich William W. Streilein

Since the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers makes it difficult to evaluate the effectiveness of defenses, and answer critical questions about the interoperability, composability, and efficacy of existing defensive tec...

2012
Andrei Homescu Michael Stewart Per Larsen Stefan Brunthaler Michael Franz

Return-oriented programming (ROP) has gained a lot of popularity lately, as an attack against currently implemented defenses in modern operating systems. Several kinds of ROP-based attacks and anti-ROP defenses have been proposed in recent years. The original attack technique depends on the existence of a hand-picked set of byte sequences (called gadgets) in the program, while subsequent approa...

2017
Jae-Hyuk Lee Jin Soo Jang Yeongjin Jang Nohyun Kwak Yeseul Choi Changho Choi Taesoo Kim Marcus Peinado Brent ByungHoon Kang

Intel Software Guard Extensions (SGX) is a hardwarebased Trusted Execution Environment (TEE) that is widely seen as a promising solution to traditional security threats. While SGX promises strong protection to bugfree software, decades of experience show that we have to expect vulnerabilities in any non-trivial application. In a traditional environment, such vulnerabilities often allow attacker...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید