首页> 外文会议>International Conference on Electrical Electronics Engineering and Computer Science >Research of ROP attack and defense technology based on ARM architecture
【24h】

Research of ROP attack and defense technology based on ARM architecture

机译:基于ARM架构的ROP攻击与防御技术研究

获取原文

摘要

In recent years, with the development of mobile technology, almost all the smart phones and panel personal computers using the ARM architecture, and security issues on this platform arealso getting more and more attention from researchers. Attack of malicious tampering program flow control is one of the major attacks for the platform. Attackers use thevulnerability of stack overflow to write long data in internal storage which make it beyond its buffer capacity, cover the return address, and thus transfer to the attacker's malicious control flow. To defend this type of attack, the operating system was added with W + X protection mechanisms, viz.dataExecution Prevention (DEP). The hardware was realized by IntelXD(Execute Disable bit) technology, ND(No-Execute Page-Protection) of AMD technology and XN(eXecute Never) ARMtechnology. Return-oriented programming (ROP) isbased on this proposed defense technology.
机译:近年来,随着移动技术的发展,几乎所有智能手机和面板个人计算机使用ARM架构,以及这个平台的安全问题Arealso越来越多地关注研究人员。恶意篡改程序流量控制的攻击是平台的主要攻击之一。攻击者使用堆栈溢出的vulnerability来写入内部存储中的长数据,使其超出其缓冲容量,覆盖返回地址,从而传输到攻击者的恶意控制流程。要捍卫这种类型的攻击,请使用W + X保护机制,VIZ.DATAExecution(DEP)添加操作系统。通过Intelxd(Execute Disable Bit)技术,ND(No-Execute页面保护)的AMD技术和XN(从不执行的)腋下来实现硬件。以返回返回的编程(ROP)在这一提出的防御技术上被竞争。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号