Return Oriented Programming - Exploit Implementation using functions

Sunil Kumar Sathyanarayan, Dr. Makan Pourzandi, Katayoun Aliyari

Return Oriented programming was surfaced first a decade ago, and was built to overcome the buffer exploit defense mechanisms like ASLR, DEP (or W^ X) by method of reusing the system code in the form of gadgets which are stitched together to make a Turing complete attack. And to perform Turing complete attack would require greater efforts which are quite complex, and there is very little research available for performing a Turing complete attack. So, in this project, we are systematizing the knowledge of the existing research that can be used to perform a Turing complete ROP attack.

Knowledge Graph

arrow_drop_up

Comments

Sign up or login to leave a comment