A-R Exploit: an Automatic Rop Exploit Based on Long Sequence

Chao Yang,Tao Zheng,Zhitian Lin
DOI: https://doi.org/10.1109/sere-c.2014.22
2014-01-01
Abstract:More attention has been paid to program security since ROP had been proposed. An ROP defence scheme based on detecting frequent ret sequences was designed in 2009 and it was proved an useful way to defend most ROP attacks. However, this scheme was bypassed by Lgadget, which makes use of long ret sequences and was proposed by J Cao in 2013. Based on J Cao's work, this paper improves the Lgadgets and designs a frame work automatically distributing gadgets addresses into the stack to trigger an ROP exploit. Our work includes turing-complete gadgets gathering, definition and compilation of upper level language, and automated linking and chaining of the gadgets in the stack. We demonstrate the viability and effectiveness of this kind of automatic exploit.
What problem does this paper attempt to address?