Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DataCite
DublinCore
EndNote
NLM
RefWorks
RIS

Files

Abstract

Return-oriented Programming (ROP) has become the most common way to exploit bugs in application, and stack pivoting is a common techniques for facilitating the attack. Stack pivoting poses a challenge in finding the root cause of the exploitation because it is hard to trace the execution flow and identify the exact trigger point of exploitation. This thesis presents several ways to do stack pivoting and designed methods to traceback in different situations. We tested our methods with real system crash dumps and evaluate the effective- ness of our approaches. Our solution is expect to help malware researchers to debug and defend against ROP-based attacks.

Details

PDF

Statistics

from
to
Export
Download Full History