YoVDO

ROP is Still Dangerous - Breaking Modern Defenses

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Control-Flow Integrity Courses Return-oriented Programming Courses

Course Description

Overview

Explore a critical security presentation from USENIX Security '14 that examines the ongoing threat of Return Oriented Programming (ROP) and introduces three new attack methods capable of bypassing modern ROP defenses. Delve into the vulnerabilities of kBouncer and ROPecker, two low-overhead defense mechanisms designed for legacy software on existing hardware. Analyze real-world ROP attacks and learn how the presented techniques can effectively cloak them from detection. Gain insights into the weaknesses of CFI-based defenses and understand the implications for future security measures. The 17-minute talk covers topics including ROP background, normal execution patterns, non-call-preceded returns, attack detection methods, large NOP gadgets, history flushing, and the introduction of kBouncer++. Conclude by examining related work and discussing the broader implications for defensive strategies in cybersecurity.

Syllabus

Intro
Background
Return Oriented Programming
Normal Execution
Non-Call-Preceded Return
Detecting Attacks
Large NOP Gadget
History Flushing
Introducing kBouncer++
Call-Preceded Detector Insufficient
Defeating kBouncer++
Results
Related Work
Implication for Defenses


Taught by

USENIX

Related Courses

Never Been KIST - Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
USENIX via YouTube
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
USENIX via YouTube
Control-Flow Bending - On the Effectiveness of Control-Flow Integrity
USENIX via YouTube
Protecting Privacy of BLE Device Users
USENIX via YouTube
K-Fingerprinting - A Robust Scalable Website Fingerprinting Technique
USENIX via YouTube