Research progress in code reuse attacking and defending
Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-03-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530152461271040 |
---|---|
author | Xiangdong QIAO Rongxiao GUO Yong ZHAO |
author_facet | Xiangdong QIAO Rongxiao GUO Yong ZHAO |
author_sort | Xiangdong QIAO |
collection | DOAJ |
description | Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed. |
format | Article |
id | doaj-art-95ddf0b980f643398a512dd236704046 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2018-03-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-95ddf0b980f643398a512dd2367040462025-01-15T03:12:37ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-03-01411259552883Research progress in code reuse attacking and defendingXiangdong QIAORongxiao GUOYong ZHAOCode reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017software securitycode reusereturn-oriented programming (ROP)research progress |
spellingShingle | Xiangdong QIAO Rongxiao GUO Yong ZHAO Research progress in code reuse attacking and defending 网络与信息安全学报 software security code reuse return-oriented programming (ROP) research progress |
title | Research progress in code reuse attacking and defending |
title_full | Research progress in code reuse attacking and defending |
title_fullStr | Research progress in code reuse attacking and defending |
title_full_unstemmed | Research progress in code reuse attacking and defending |
title_short | Research progress in code reuse attacking and defending |
title_sort | research progress in code reuse attacking and defending |
topic | software security code reuse return-oriented programming (ROP) research progress |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018017 |
work_keys_str_mv | AT xiangdongqiao researchprogressincodereuseattackinganddefending AT rongxiaoguo researchprogressincodereuseattackinganddefending AT yongzhao researchprogressincodereuseattackinganddefending |