Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2016, Volume 28, Issue 6, Pages 27–36
DOI: https://doi.org/10.15514/ISPRAS-2016-28(6)-2
(Mi tisp82)
 

This article is cited in 6 scientific papers (total in 6 papers)

Classification of ROP gadgets

A. V. Vishnyakov

Institute for System Programming of the Russian Academy of Sciences
References:
Abstract: Return-oriented programming (ROP) is a dangerous exploitation technique which can be used to bypass modern defense mechanisms. ROP reuses code chunks ending with control transfer instruction from a program binary to form a chain corresponding some payload. These code chunks are called gadgets. Though, a certain set of gadgets should be available to exploit a vulnerability. Determining gadgets that can be used to form a ROP chain can be done by gadgets search and classification. This paper introduces a method for ROP gadgets classification that allows one to evaluate whether or not ROP technique can be used to exploit a program vulnerability. Classification is based on side-effects analysis of gadget execution with concrete inputs. Gadget instructions are translated into IR which is interpreted to track registers and memory usage. Initial registers and memory values are randomly generated. According to initial and final values of registers and memory gadget semantics can be explored. Classification performs several executions to determine gadget semantics. Proposed method is applied to program binaries and its capabilities were demonstrated on 32-bit and 64-bit binaries from Ubuntu 14.04. Using classification results program exploitability was confirmed for several examples. Furthermore, a possible exploitation of stack buffer overflow vulnerability in presence of write-what-where condition was shown on a model example demonstrating a bypass of canary, DEP and ASLR.
Keywords: vulnerability, ROP, classification.
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: A. V. Vishnyakov, “Classification of ROP gadgets”, Proceedings of ISP RAS, 28:6 (2016), 27–36
Citation in format AMSBIB
\Bibitem{Vis16}
\by A.~V.~Vishnyakov
\paper Classification of ROP gadgets
\jour Proceedings of ISP RAS
\yr 2016
\vol 28
\issue 6
\pages 27--36
\mathnet{http://mi.mathnet.ru/tisp82}
\crossref{https://doi.org/10.15514/ISPRAS-2016-28(6)-2}
\elib{https://elibrary.ru/item.asp?id=27679166}
Linking options:
  • https://www.mathnet.ru/eng/tisp82
  • https://www.mathnet.ru/eng/tisp/v28/i6/p27
  • This publication is cited in the following 6 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:422
    Full-text PDF :335
    References:43
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024