Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2665936.2665937acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network

Published: 03 November 2014 Publication History

Abstract

Targeted attacks exploiting a zero-day vulnerability are serious threats for many organizations. One reason is that generally available attack tools are very powerful and easy-to-use for attackers. In this paper, we propose n-ROPdetector that detects ROP (Return-Oriented Programming) attack code on the network side. ROP is a core technique used in zero-day attacks. The n-ROPdetector is noticeable method to detect ROP code efficiently on the network side rather than on the host machines side. To evaluate the n-ROPdetector and to show its effectiveness, we used the attack code samples from the attack tool Metasploit and the n-ROPdetector detected 84% of ROP codes in Metasploit.

References

[1]
Hovav Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS), 2007.
[2]
Symantec: 2014 Internet Security Threat Report, Volume 19, http://www.symantec.com/security_response/publications/threatreport.jsp.
[3]
Thomas Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In Proceedings of the 5th Symposium on Recent Advances in Intrusion Detection (RAID), 2002.
[4]
Ramkumar Chinchani and E. van den Berg. A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows. In Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID), 2005.
[5]
Michalis Polychronakis, Kostas G. Anagnostakis, and Evangelos P. Markatos. Comprehensive Shellcode Detection using Runtime Heuristics. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), 2010.
[6]
Javad Khodaverdi. Enhancing the Effectiveness of Shellcode Detection by New Runtime Heuristics. In International Journal of Computer Science Research and Application (2013), Vol. 03, Issue. 02, pp. 02--11.
[7]
Skape: Safely searching process virtual address space, http://www.hick.org/code/skape/papers/
[8]
Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. ROPdefender: A practical protection tool to protect against return-oriented programming. In Proceedings of the 6th Symposium on Information, Computer and Communications Security (ASIACCS), 2011.
[9]
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proceedings of 22nd USENIX Security Conference on Security, 2013.
[10]
Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen. MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. In Proceedings of 22nd USENIX Security Conference on Security, 2013.
[11]
Microsoft Developer Network. http://msdn.microsoft.com/en-us/library/bb430720.aspx
[12]
Metasploit. http://www.metasploit.com/
[13]
Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attack is Hard. In Proceedings of 23nd USENIX Security Conference on Security, 2014.

Cited By

View all
  • (2023)Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionCybersecurity10.1186/s42400-022-00135-86:1Online publication date: 5-Jan-2023
  • (2022)Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data StreamElectronics10.3390/electronics1120336311:20(3363)Online publication date: 18-Oct-2022
  • (2020)DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristicsJournal of Computer Security10.3233/JCS-191368(1-25)Online publication date: 10-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SafeConfig '14: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation
November 2014
48 pages
ISBN:9781450331470
DOI:10.1145/2665936
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. nids
  2. return-oriented programming
  3. zero-day attack

Qualifiers

  • Research-article

Conference

CCS'14
Sponsor:

Acceptance Rates

SafeConfig '14 Paper Acceptance Rate 3 of 11 submissions, 27%;
Overall Acceptance Rate 22 of 61 submissions, 36%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionCybersecurity10.1186/s42400-022-00135-86:1Online publication date: 5-Jan-2023
  • (2022)Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data StreamElectronics10.3390/electronics1120336311:20(3363)Online publication date: 18-Oct-2022
  • (2020)DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristicsJournal of Computer Security10.3233/JCS-191368(1-25)Online publication date: 10-Sep-2020
  • (2020)ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP GadgetsIEICE Transactions on Information and Systems10.1587/transinf.2019ICP0016E103.D:7(1476-1492)Online publication date: 1-Jul-2020
  • (2016)POSTERProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2989040(1808-1810)Online publication date: 24-Oct-2016
  • (2014)Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and AutomationProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660382(1544-1545)Online publication date: 3-Nov-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media