With the discovery of new exploit techniques, new protection mechanisms areneeded as well. Mitigations like DEP (Data Execution Prevention) or ASLR(Address Space Layout Randomization) created a significantly more difficultenvironment for vulnerability exploitation. Attackers, however, have recentlydeveloped new exploitation methods which are capable of bypassing the operatingsystem's security protection mechanisms. In this paper we present a shortsummary of novel and known mitigation techniques against return-orientedprogramming (ROP) attacks. The techniques described in this article are relatedmostly to x86-32 processors and Microsoft Windows operating systems.
展开▼