Research of ROP attack and defense technology based on ARM architecture
- DOI
- 10.2991/iceeecs-16.2016.201How to use a DOI?
- Keywords
- ARM architecture, ROP, attack and defense,technical research
- Abstract
In recent years, with the development of mobile technology,almost all the smart phones and panel personal computers using the ARM architecture, and security issues on this platform arealso getting more and more attention from researchers. Attack of malicious tampering program flow control is one of the major attacks for the platform. Attackers use thevulnerability of stack overflow to write long data in internal storage which make it beyond its buffer capacity, cover the return address, and thus transfer to the attacker's malicious control flow. To defend this type of attack,the operating system was added with W + X protection mechanisms,viz.dataExecution Prevention (DEP). The hardware was realized by IntelXD(Execute Disable bit)technology, ND(No-Execute Page-Protection) of AMD technology and XN(eXecute Never) ARMtechnology. Return-oriented programming (ROP) isbased on this proposed defense technology.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Qi Cai AU - Jingbo Guo PY - 2016/12 DA - 2016/12 TI - Research of ROP attack and defense technology based on ARM architecture BT - Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016) PB - Atlantis Press SP - 1041 EP - 1046 SN - 2352-538X UR - https://doi.org/10.2991/iceeecs-16.2016.201 DO - 10.2991/iceeecs-16.2016.201 ID - Cai2016/12 ER -