Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture

01/18/2022
by   Kai Lehniger, et al.
0

This paper shows how the Xtensa architecture can be attacked with Return-Oriented-Programming (ROP). The presented techniques include possibilities for both supported Application Binary Interfaces (ABIs). Especially for the windowed ABI a powerful mechanism is presented that not only allows to jump to gadgets but also to manipulate registers without relying on specific gadgets. This paper purely focuses on how the properties of the architecture itself can be exploited to chain gadgets and not on specific attacks or a gadget catalog.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/15/2021

Return-Oriented Programming on RISC-V

This paper provides the first analysis on the feasibility of Return-Orie...
research
12/11/2020

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation

Largely known for attack scenarios, code reuse techniques at a closer lo...
research
10/04/2018

Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device

Cybercriminals use Return Oriented Programming techniques to attack syst...
research
11/26/2022

Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming

RISC-V is an open instruction set architecture recently developed for em...
research
02/22/2019

Exploitation Techniques and Defenses for Data-Oriented Attacks

Data-oriented attacks manipulate non-control data to alter a program's b...
research
01/21/2014

A Microkernel Architecture for Constraint Programming

This paper presents a microkernel architecture for constraint programmin...
research
07/23/2020

Exploratory Experiments on Programming Autonomous Robots in Jadescript

This paper describes exploratory experiments to validate the possibility...

Please sign up or login with your details

Forgot password? Click here to reset