نتایج جستجو برای: Code Reuse Attacks

تعداد نتایج: 245922  

Journal: :isecure, the isc international journal of information security 0
a. a sadeghi f. aminmansour h. r. shahriari

code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. a large number of practical and non-practical defenses have been proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. however, a usual aspect among them is to consider the common behavio...

A. A Sadeghi F. Aminmansour H. R. Shahriari

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

Journal: :Modeling and Analysis of Information Systems 2019

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

Journal: :Journal of Information Security and Applications 2016

Journal: :IEEE Transactions on Computers 2015

Journal: :Proceedings of the Institute for System Programming of the RAS 2018

Journal: :IEEE Transactions on Computers 2014

2016
Sergio Pastrana Juan E. Tapiador Guillermo Suarez-Tangil Pedro Peris-López

Code reuse attacks are advanced exploitation techniques that constitute a serious threat for modern systems. They profit from a control flow hijacking vulnerability to maliciously execute one or more pieces of code from the targeted application. ASLR and Control Flow Integrity are two mechanisms commonly used to deter automated attacks based on code reuse. Unfortunately, none of these solutions...

2013
Aditi Gupta Sam Kerr Michael S. Kirkpatrick Elisa Bertino

Code-reuse attacks, such as return-oriented programming (ROP), bypass defenses against code injection by repurposing existing executable code toward a malicious end. A common feature of these attacks is the reliance on the knowledge of the layout of the executable code. We propose a fine grained randomization based approach that modifies the layout of executable code and hinders code-reuse atta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید