Visible to the public Offensive and Defensive Countermeasure Technology of Return-Oriented Programming

TitleOffensive and Defensive Countermeasure Technology of Return-Oriented Programming
Publication TypeConference Paper
Year of Publication2021
AuthorsXu, Zixuan, Zhang, Jingci, Ai, Shang, Liang, Chen, Liu, Lu, Li, Yuanzhang
Conference Name2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing Communications (GreenCom) and IEEE Cyber, Physical Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)
Date Publisheddec
KeywordsBuffer overflows, codes, composability, Computer architecture, confrontation and defense, development status, human factors, Information systems, Programming, pubcrawl, Resiliency, return-oriented programming, rop attacks, Scalability, security, social computing, system security
AbstractThe problem of buffer overflow in the information system is not threatening, and the system's own defense mechanism can detect and terminate code injection attacks. However, as countermeasures compete with each other, advanced stack overflow attacks have emerged: Return Oriented-Programming (ROP) technology, which has become a hot spot in the field of system security research in recent years. First, this article explains the reason for the existence of this technology and the attack principle. Secondly, it systematically expounds the realization of the return-oriented programming technology at home and abroad in recent years from the common architecture platform, the research of attack load construction, and the research of variants based on ROP attacks. Finally, we summarize the paper.
DOI10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00046
Citation Keyxu_offensive_2021