Show simple item record

dc.contributor.authorOyinloye, Toyosi
dc.contributor.authorSpeakman, Lee
dc.contributor.authorEze, Thaddeus
dc.date.accessioned2023-03-08T10:25:45Z
dc.date.available2023-03-08T10:25:45Z
dc.date.issued2023-02-28
dc.identifierhttps://chesterrep.openrepository.com/bitstream/handle/10034/627639/Ret%20Gadgets-2023.pdf?sequence=1
dc.identifier.citationOyinloye, T., Speakman, L., & Eze, T. (2023). Ret-gadgets in RISC-V-based binaries resulting in traps for hijackers. Proceedings of the 18th International Conference on Cyber Warfare and Security, (pp. 291-299). Academic Conferences International.en_US
dc.identifier.isbn9781914587610en_US
dc.identifier.issn2048-9870
dc.identifier.urihttp://hdl.handle.net/10034/627639
dc.description.abstractThe presence of instructions within executable programs is what makes the binaries executable. However, attackers leverage on the same to achieve some form of Control Flow Hijacking (CFH). Such code re-use attacks have also been found to lead to Denial of Service (DoS). An example of code re-use attack is Return Oriented Programming (ROP) which is caused by passing input crafted as chained sequences of instructions that are already existing as subroutines in the target program. The instructions are called gadgets and they would normally end with ret. The ret instructions enable the flow of hijacked execution from one set of instruction to another within the attacker’s control. There could however be exceptions depending on the structure of the chained gadgets where the chained gadget fails to run its course due to inability of specific gadgets to replace the value in the return address (ra) register. The dangers of chained gadgets are not a new idea but the possibility for an attacker’s gadget chain to fall into a trap during a ROP attack is not commonly addressed. In addition to this, recent studies have revealed that understanding the behaviours of gadgets would be useful for building information base in training machine learning (ML) models to combat ROP. This study explains the behaviour of certain ROP gadgets showing the possibility of occurrence of a loop in execution during exploitation. A sample program which accesses gadgets from the GNU C library (glibc) is used to demonstrate the findings. Gadgets identified with this possibility are poor for chaining as they do not contain instructions to load or move new values to the ra register and would produce unreliable exploits. This would result in a trap for the chained gadgets instead of arbitrary code execution, and DoS on the path of the user. This implies that the impact that a ROP chain could have on a targeted process does not only rely on the underlying system architecture but also on relies on the structure of the chained gadget. In this paper, the RISC-V architecture is the focus, new gadget finders (scripts are available) are presented, and sample of chained gadgets are analysed on a RISC-V -based binary.en_US
dc.publisherAcademic Conferences Internationalen_US
dc.relation.urlhttps://papers.academic-conferences.org/index.php/iccws/issue/view/16/18en_US
dc.relation.urlhttps://papers.academic-conferences.org/index.php/iccwsen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.subjectRISC-Ven_US
dc.subjectReturn oriented programmingen_US
dc.subjectDenial of Serviceen_US
dc.subjectRet-gadgetsen_US
dc.subjectCode-reuseen_US
dc.subjectControl flow hijacken_US
dc.titleRet-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackersen_US
dc.typeConference Proceedingen_US
dc.identifier.eissn2048-9889en_US
dc.contributor.departmentUniversity of Chester; University of Salforden_US
or.grant.openaccessYesen_US
rioxxterms.funderunfundeden_US
rioxxterms.identifier.projectunfundeden_US
rioxxterms.versionAMen_US
dcterms.dateAccepted2022-12-02
rioxxterms.publicationdate2023-02-28
dc.date.deposited2023-03-08en_US
dc.indentifier.issn2048-9870en_US


Files in this item

Thumbnail
Name:
Ret Gadgets-2023.pdf
Size:
431.6Kb
Format:
PDF
Request:
Conference proceeding

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by/4.0/