TY - GEN
T1 - A principled approach for ROP defense
AU - Qiao, Rui
AU - Zhang, Mingwei
AU - Sekar, R.
N1 - Publisher Copyright: © 2015 ACM.
PY - 2015/12/7
Y1 - 2015/12/7
N2 - Return-Oriented Programming (ROP) is an effective attack technique that can escape modern defenses such as DEP. ROP is based on repeated abuse of existing code snippets ending with return instructions (called gadgets), as compared to using injected code. Several defense mechanisms have been proposed to counter ROP by enforcing policies on the targets of return instructions, and/or their frequency. However, these policies have been repeatedly bypassed by more advanced ROP attacks. While stricter policies have the potential to thwart ROP, they lead to incompatibilities which discourage their deployment. In this work, we address this challenge by presenting a principled approach for ROP defense. Our experimental evaluation shows that our approach enforces a strong policy, while offering better compatibility and good performance.
AB - Return-Oriented Programming (ROP) is an effective attack technique that can escape modern defenses such as DEP. ROP is based on repeated abuse of existing code snippets ending with return instructions (called gadgets), as compared to using injected code. Several defense mechanisms have been proposed to counter ROP by enforcing policies on the targets of return instructions, and/or their frequency. However, these policies have been repeatedly bypassed by more advanced ROP attacks. While stricter policies have the potential to thwart ROP, they lead to incompatibilities which discourage their deployment. In this work, we address this challenge by presenting a principled approach for ROP defense. Our experimental evaluation shows that our approach enforces a strong policy, while offering better compatibility and good performance.
UR - https://www.scopus.com/pages/publications/84959336213
U2 - 10.1145/2818000.2818021
DO - 10.1145/2818000.2818021
M3 - Conference contribution
T3 - ACM International Conference Proceeding Series
SP - 101
EP - 110
BT - Proceedings - 31st Annual Computer Security Applications Conference, ACSAC 2015
PB - Association for Computing Machinery
T2 - 31st Annual Computer Security Applications Conference, ACSAC 2015
Y2 - 7 December 2015 through 11 December 2015
ER -