Protection Against Return Oriented Programming Attacks

作者: Stephen A. Fischer

DOI:

关键词:

摘要: In one embodiment, a processor includes at least execution unit. The also Return Oriented Programming (ROP) logic coupled to the ROP may validate return pointer stored on call stack based secret value. value only be accessible by operating system.

参考文章(71)
Lixin Li, James Edward Just, A diversity-based security system and method ,(2007)
John J. Danahy, Ryan J. Berg, Lawrence J. Rose, Secure remote kernel communication ,(2001)
Clarence T. Tegreene, Andrew F. Glew, Daniel A. Gerrity, Taint vector locations and granularity ,(2011)
Clarence T. Tegreene, Andrew F. Glew, Daniel A. Gerrity, Conditional security response using taint vector monitoring ,(2011)
Clarence T. Tegreene, Andrew F. Glew, Daniel A. Gerrity, Intrusion detection using taint accumulation ,(2011)
Clarence T. Tegreene, Andrew F. Glew, Daniel A. Gerrity, Processor operable to ensure code integrity ,(2011)
Clarence T. Tegreene, Mark A. Malamud, Matthew G. Dyor, Royce A. Levien, Daniel A. Gerrity, Marc E. Davis, Robert W. Lord, Roderick A. Hyde, Xuedong Huang, Richard T. Lord, Nathan P. Myhrvold, Behavioral fingerprint controlled automatic task determination ,(2011)
Ylian Saint-Hilaire, Frederick Strahm, James Edwards, John Richardson, Countering buffer overrun security vulnerabilities in a CPU ,(2001)