Visible to the public ROPMate: Visually Assisting the Creation of ROP-based Exploits

TitleROPMate: Visually Assisting the Creation of ROP-based Exploits
Publication TypeConference Paper
Year of Publication2018
AuthorsAngelini, M., Blasilli, G., Borrello, P., Coppa, E., D’Elia, D. C., Ferracci, S., Lenti, S., Santucci, G.
Conference Name2018 IEEE Symposium on Visualization for Cyber Security (VizSec)
ISBN Number978-1-5386-8194-7
KeywordsBuildings, code reuse, composability, Data analysis, data visualisation, Human Behavior, malware analysis, program testing, Programming, pubcrawl, Registers, Resiliency, return oriented programming, return-oriented programming, rop attacks, ROP chains, ROP Exploits, ROP-based attacks, ROP-based exploits, ROPMate, Scalability, security, security of data, semantically correct chains, semantically meaningful gadgets, software reliability, Task Analysis, Tools, visual aids, visual analytics, visual analytics system
Abstract

Exploits based on ROP (Return-Oriented Programming) are increasingly present in advanced attack scenarios. Testing systems for ROP-based attacks can be valuable for improving the security and reliability of software. In this paper, we propose ROPMATE, the first Visual Analytics system specifically designed to assist human red team ROP exploit builders. In contrast, previous ROP tools typically require users to inspect a puzzle of hundreds or thousands of lines of textual information, making it a daunting task. ROPMATE presents builders with a clear interface of well-defined and semantically meaningful gadgets, i.e., fragments of code already present in the binary application that can be chained to form fully-functional exploits. The system supports incrementally building exploits by suggesting gadget candidates filtered according to constraints on preserved registers and accessed memory. Several visual aids are offered to identify suitable gadgets and assemble them into semantically correct chains. We report on a preliminary user study that shows how ROPMATE can assist users in building ROP chains.

URLhttps://ieeexplore.ieee.org/document/8709204
DOI10.1109/VIZSEC.2018.8709204
Citation Keyangelini_ropmate:_2018