Security Mitigations for Return-Oriented Programming Attacks

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Type

Scientific paper

Abstract

With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system's security protection mechanisms. In this paper we present a short summary of novel and known mitigation techniques against return-oriented programming (ROP) attacks. The techniques described in this article are related mostly to x86-32 processors and Microsoft Windows operating systems.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security Mitigations for Return-Oriented Programming Attacks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security Mitigations for Return-Oriented Programming Attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security Mitigations for Return-Oriented Programming Attacks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-394235

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.