Show simple item record

dc.contributor.authorYing, Yuchen
dc.date.accessioned2015-05-07T04:30:28Z
dc.date.available2015-05-07T04:30:28Z
dc.date.issued2014-08
dc.identifier.otherying_yuchen_201408_ms
dc.identifier.urihttp://purl.galileo.usg.edu/uga_etd/ying_yuchen_201408_ms
dc.identifier.urihttp://hdl.handle.net/10724/31347
dc.description.abstractReturn-oriented Programming (ROP) has become the most common way to exploit bugs in application, and stack pivoting is a common techniques for facilitating the attack. Stack pivoting poses a challenge in finding the root cause of the exploitation because it is hard to trace the execution flow and identify the exact trigger point of exploitation. This thesis presents several ways to do stack pivoting and designed methods to traceback in different situations. We tested our methods with real system crash dumps and evaluate the effective- ness of our approaches. Our solution is expect to help malware researchers to debug and defend against ROP-based attacks.
dc.languageeng
dc.publisheruga
dc.rightspublic
dc.subjectReturn-Oriented Programming
dc.subjectROP
dc.subjectStack Pivot
dc.titleUnROP
dc.title.alternativecreating correct backtrace from core dumps with stack pivoting
dc.typeThesis
dc.description.degreeMS
dc.description.departmentComputer Science
dc.description.majorComputer Science
dc.description.advisorKang Li
dc.description.committeeKang Li
dc.description.committeeRoberto Perdisci
dc.description.committeeKrzysztof J. Kochut


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record