Research of ROP attack and defense technology based on ARM architecture
Qi Cai, Jingbo Guo
Available Online December 2016.
- https://doi.org/10.2991/iceeecs-16.2016.201How to use a DOI?
- ARM architecture, ROP, attack and defense,technical research
- In recent years, with the development of mobile technology,almost all the smart phones and panel personal computers using the ARM architecture, and security issues on this platform arealso getting more and more attention from researchers. Attack of malicious tampering program flow control is one of the major attacks for the platform. Attackers use thevulnerability of stack overflow to write long data in internal storage which make it beyond its buffer capacity, cover the return address, and thus transfer to the attacker's malicious control flow. To defend this type of attack,the operating system was added with W + X protection mechanisms,viz.dataExecution Prevention (DEP). The hardware was realized by IntelXD(Execute Disable bit)technology, ND(No-Execute Page-Protection) of AMD technology and XN(eXecute Never) ARMtechnology. Return-oriented programming (ROP) isbased on this proposed defense technology.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Qi Cai AU - Jingbo Guo PY - 2016/12 DA - 2016/12 TI - Research of ROP attack and defense technology based on ARM architecture BT - 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016) PB - Atlantis Press SN - 2352-538X UR - https://doi.org/10.2991/iceeecs-16.2016.201 DO - https://doi.org/10.2991/iceeecs-16.2016.201 ID - Cai2016/12 ER -