首页> 外文会议>International conference on computational science and its applications >Jump Oriented Programming on Windows Platform (on the x86)
【24h】

Jump Oriented Programming on Windows Platform (on the x86)

机译:Windows平台上的面向跳转的编程(在x86上)

获取原文

摘要

Non-executable memory pages were deployed in operating systems in order to defend against code injection attacks. However, it was bypassed by reusing codes that already exist in the process memory which have the execute permission. The Return-Oriented Programming (ROP), of the most well-known code reuse attack, has been developed and widely used to exploit systems. ROP hijacks the control flow and returns to the middle of instruction sequences that end with a return instruction. These instruction sequences are called gadgets. Researchers proposed many ROP defense mechanisms which mostly relied on the fact that ROP executes many return instructions. Proposed defenses however, are not fundamental defenses. Researches found that the concept of ROP can be implemented in Linux using jump instructions instead of return instructions, therefore successfully bypassing ROP defenses. However, no research was done on implementing the attack on non-Linux systems. In this paper, we show the possibility of implementing JOP (Jump Oriented Programming) attack model on Windows platform by presenting example gadgets and propose an algorithm for searching JOP gadgets in Dynamic Link Libraries.
机译:不可执行的内存页已部署在操作系统中,以防御代码注入攻击。但是,通过重用进程内存中已经存在的具有执行许可权的代码来绕过它。已经开发出最著名的代码重用攻击的面向返回的编程(ROP),并广泛用于开发系统。 ROP劫持了控制流,并返回到以返回指令结尾的指令序列的中间。这些指令序列称为小工具。研究人员提出了许多ROP防御机制,这些机制主要依赖于ROP执行许多返回指令这一事实。但是,建议的防御措施不是基本的防御措施。研究发现ROP的概念可以在Linux中使用跳转指令而不是返回指令来实现,因此成功绕过了ROP防御。但是,尚未对在非Linux系统上实施攻击进行任何研究。在本文中,我们通过展示示例小工具并提出在动态链接库中搜索JOP小工具的算法,展示了在Windows平台上实现JOP(跳转编程)攻击模型的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号