Главная
Study mode:
on
1
Intro
2
Background
3
Return Oriented Programming
4
Normal Execution
5
Non-Call-Preceded Return
6
Detecting Attacks
7
Large NOP Gadget
8
History Flushing
9
Introducing kBouncer++
10
Call-Preceded Detector Insufficient
11
Defeating kBouncer++
12
Results
13
Related Work
14
Implication for Defenses
Description:
Explore a critical security presentation from USENIX Security '14 that examines the ongoing threat of Return Oriented Programming (ROP) and introduces three new attack methods capable of bypassing modern ROP defenses. Delve into the vulnerabilities of kBouncer and ROPecker, two low-overhead defense mechanisms designed for legacy software on existing hardware. Analyze real-world ROP attacks and learn how the presented techniques can effectively cloak them from detection. Gain insights into the weaknesses of CFI-based defenses and understand the implications for future security measures. The 17-minute talk covers topics including ROP background, normal execution patterns, non-call-preceded returns, attack detection methods, large NOP gadgets, history flushing, and the introduction of kBouncer++. Conclude by examining related work and discussing the broader implications for defensive strategies in cybersecurity.

ROP is Still Dangerous - Breaking Modern Defenses

USENIX
Add to list