Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard

Pages: 417 - 432
Published: Aug 20, 2014
Abstract
Code-reuse attacks based on return oriented programming are among the most popular exploitation techniques used by attackers today. Few practical defenses are able to stop such attacks on arbitrary binaries without access to source code. A notable exception are the techniques that employ new hardware, such as Intel's Last Branch Record (LBR) registers, to track all indirect branches and raise an alert when a sensitive system call is reached by...
Paper Details
Title
Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard
Published Date
Aug 20, 2014
Pages
417 - 432
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.