Volutions - ID | News | Gadget | Tutorial | Freeware | Template | Etc.: Security Mitigations for Return-Oriented Programming Attacks

Security Mitigations for Return-Oriented Programming Attacks

With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization)created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system's security protection mechanisms.In this paper we present a short summary of novel and known mitigation techniques against return-oriented programming (ROP) attacks. The techniques described in this article are related mostly to x86-32 processors and Microsoft Windows operating systems.

Download PDF

Enter your email address:

Related Post



  • Digg
  • del.icio.us
  • Facebook
  • Google
  • StumbleUpon
  • Technorati
  • TwitThis

No response to “Security Mitigations for Return-Oriented Programming Attacks”

Leave a reply

 
Support By Blogger