Nytro Posted August 4, 2012 Report Posted August 4, 2012 Return Oriented ProgrammingCSCI 6621: Network SecurityWeek 11, Lecture 21: Tuesday, 04/04/2011Daniel BilarUniversity of New OrleansDepartment of Computer ScienceSpring 2011Goals today• Review: Buffer overflow, format string• Return Oriented Programming– Chain together sequences (‘gadgets’) ending in RET– Can use good code chunks as ‘alphabet’, stringtogether to get for bad code• Some similarities to an antigram (form of anagram)Within earshot ‡ I won't hear this– Build “gadgets” for load?store, arithmetic,logic, control flow, system calls– Attack can perform arbitrary computationusing no injected code at allSome slides gratefully adapted from Shacham BH 08 presentation(UCSD)Download:http://shell-storm.org/papers/files/779.pdf Quote