scholarly journals ROP Defense Using Trie Graph For System Security

2021 ◽  
Vol 13 (6) ◽  
pp. 0-0

Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection. Malicious attackers chain a short sequence as a gadget and execute this gadget as an arbitrary (Turing-complete) behavior in the target program. Lots of ROP defense tools have been developed with satisfactory performance and low costs overhead, but malicious attackers can evade ROP tools. Therefore, it needs security researchers to continually improve existing ROP defense tools, because the defense ability of target devices, such as smartphones is weak, and such devices are being increasingly targeted.  Our contribution in this paper is to propose an ROP defense method that has provided a better performance of defense against ROP attacks than existing ROP defense tools.

2021 ◽  
Vol 13 (6) ◽  
pp. 1-12
Author(s):  
Alex Yao Chu Zhu ◽  
Wei Qi Yan ◽  
Roopak Sinha

Most Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) cannot defend the attacks from a Return Oriented Program (ROP) which applies code reusing and exploiting techniques without the need for code injection. Malicious attackers chain a short sequence as a gadget and execute this gadget as an arbitrary (Turing-complete) behavior in the target program. Lots of ROP defense tools have been developed with satisfactory performance and low costs overhead, but malicious attackers can evade ROP tools. Therefore, it needs security researchers to continually improve existing ROP defense tools, because the defense ability of target devices, such as smartphones is weak, and such devices are being increasingly targeted.  Our contribution in this paper is to propose an ROP defense method that has provided a better performance of defense against ROP attacks than existing ROP defense tools.


Author(s):  
Eduard-Ionuț BOROȘEANU

This article will emphasize architectures that were designed due to the new business generated by wireless infrastructures. First, authentication issues of wireless users in “hot spot” - also called “captive portal” - architectures will be discussed. Lastly, recent architectures such as WIDS/WIPS (Wireless Intrusion Detection Systems/Wireless Intrusion Prevention Systems) aiming at detecting any malicious wireless activity will be detailed.


2006 ◽  
Vol 65 (10) ◽  
pp. 929-936
Author(s):  
A. V. Agranovskiy ◽  
S. A. Repalov ◽  
R. A. Khadi ◽  
M. B. Yakubets

Sign in / Sign up

Export Citation Format

Share Document