ROP Attack and Defense Technology Based on ARM

钱逸,王轶骏,薛质
DOI: https://doi.org/10.3969/j.issn.1009-8054.2012.10.036
2012-01-01
Abstract:With the development of mobile-phone field, ARM architecture is usually used in the mobile-phone and tablet computer, and the security issues on ARM platform always attract much attention from the researchers. ROP, a popular attack method on X86 is planted into ARM. This paper analyzes the different ROP defense methods on X86, presents the technical details of ROP attack, including specific implementation and gadgets search algorithm on ARM. Finally, a library sandbox technology is suggested to defense this kind of attack and secure the system.
What problem does this paper attempt to address?