Return-oriented programming without returns

S Checkoway, L Davi, A Dmitrienko… - Proceedings of the 17th …, 2010 - dl.acm.org
We show that on both the x86 and ARM architectures it is possible to mount return-oriented
programming attacks without using return instructions. Our attacks instead make use of …

Return-oriented programming: Systems, languages, and applications

R Roemer, E Buchanan, H Shacham… - ACM Transactions on …, 2012 - dl.acm.org
We introduce return-oriented programming, a technique by which an attacker can induce
arbitrary behavior in a program whose control flow he has diverted, without injecting any …

Q: Exploit hardening made easy

EJ Schwartz, T Avgerinos, D Brumley - 20th USENIX Security …, 2011 - usenix.org
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕
X, a software defense that stops shellcode, by reusing instructions from large libraries such …

ILR: Where'd my gadgets go?

J Hiser, A Nguyen-Tuong, M Co, M Hall… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
Through randomization of the memory space and the confinement of code to non-data
pages, computer security researchers have made a wide range of attacks against program …

Branch regulation: Low-overhead protection from code reuse attacks

M Kayaalp, M Ozsoy, N Abu-Ghazaleh… - ACM SIGARCH …, 2012 - dl.acm.org
Code reuse attacks (CRAs) are recent security exploits that allow attackers to execute
arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump …

Is less really more? towards better metrics for measuring security improvements realized through software debloating

MD Brown, S Pande - 12th USENIX Workshop on Cyber Security …, 2019 - usenix.org
Nearly all modern software suffers from bloat that negatively impacts its performance and
security. To combat this problem, several automated techniques have been proposed to …

SCRAP: Architecture for signature-based protection from code reuse attacks

M Kayaalp, T Schmitt, J Nomani… - 2013 IEEE 19th …, 2013 - ieeexplore.ieee.org
Code Reuse Attacks (CRAs) recently emerged as a new class of security exploits. CRAs
construct malicious programs out of small fragments (gadgets) of existing code, thus …

ILR: Where'd My Gadgets Go?

JW Davidson, M Hall, A Nguyen-Tuong… - 2012 IEEE Symposium …, 2012 - computer.org
Through randomization of the memory space and the confinement of code to non-data
pages, computer security researchers have made a wide range of attacks against program …

[PDF][PDF] A Framework for Automated {Architecture-Independent} Gadget Search

T Dullien, T Kornau, RP Weinmann - 4th USENIX Workshop on Offensive …, 2010 - usenix.org
We demonstrate that automated, architecture-independent gadget search is possible.
Gadgets are code fragments which can be used to build unintended programs from existing …

Efficiently securing systems from code reuse attacks

M Kayaalp, M Ozsoy, NA Ghazaleh… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Code reuse attacks (CRAs) are recent security exploits that allow attackers to execute
arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump …