Research progress in code reuse attacking and defending

Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiangdong QIAO, Rongxiao GUO, Yong ZHAO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-03-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530152461271040
author Xiangdong QIAO
Rongxiao GUO
Yong ZHAO
author_facet Xiangdong QIAO
Rongxiao GUO
Yong ZHAO
author_sort Xiangdong QIAO
collection DOAJ
description Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.
format Article
id doaj-art-95ddf0b980f643398a512dd236704046
institution Kabale University
issn 2096-109X
language English
publishDate 2018-03-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-95ddf0b980f643398a512dd2367040462025-01-15T03:12:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-03-01411259552883Research progress in code reuse attacking and defendingXiangdong QIAORongxiao GUOYong ZHAOCode reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017software securitycode reusereturn-oriented programming (ROP)research progress
spellingShingle Xiangdong QIAO
Rongxiao GUO
Yong ZHAO
Research progress in code reuse attacking and defending
网络与信息安全学报
software security
code reuse
return-oriented programming (ROP)
research progress
title Research progress in code reuse attacking and defending
title_full Research progress in code reuse attacking and defending
title_fullStr Research progress in code reuse attacking and defending
title_full_unstemmed Research progress in code reuse attacking and defending
title_short Research progress in code reuse attacking and defending
title_sort research progress in code reuse attacking and defending
topic software security
code reuse
return-oriented programming (ROP)
research progress
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017
work_keys_str_mv AT xiangdongqiao researchprogressincodereuseattackinganddefending
AT rongxiaoguo researchprogressincodereuseattackinganddefending
AT yongzhao researchprogressincodereuseattackinganddefending