نتایج جستجو برای: return oriented programming
تعداد نتایج: 509816 فیلتر نتایج به سال:
Using the correlation matrix formalism we study the temporal aspects of the Warsaw Stock Market evolution as represented by the WIG20 index. The high frequency (1 min) WIG20 recordings over the time period between January 2001 and October 2005 are used. The entries of the correlation matrix considered here connect different distinct periods of the stock market dynamics, like days or weeks. Such...
S returns unexplained by “fundamentals,” such as cash flow news, are more likely to reverse in the short run than those linked to fundamental news. Making novel use of analyst forecast revisions to measure cash flow news, a simple enhanced reversal strategy generates a risk-adjusted return four times the size of the standard reversal strategy. Importantly, isolating the component of past return...
This paper provides evidence that the positive relation between firm-level stock returns and firm-level return volatility is due to real options that firms possess. Consistent with the theoretical prediction that the value of a real option should be increasing in the volatility of the underlying asset, we find that the positive volatility-return relation is much stronger for firms that are more...
Using the correlation matrix formalism we study the temporal aspects of the Warsaw Stock Market evolution as represented by the WIG20 index. The high frequency (1 min) WIG20 recordings over the time period between January 2001 and October 2005 are used. The entries of the correlation matrix considered here connect different distinct periods of the stock market dynamics, like days or weeks. Such...
Distributed execution designs challenge behavioral analyses of anti-malware solutions by spreading seemingly benign chunks a malicious payload to multiple processes. Researchers have explored methods chop payloads, spread victim applications through process injection techniques, and orchestrate the execution. However, these can hardly be practical as they exhibit conspicuous features make use p...
In this paper we present a novel and general memory-related attack method on ARM-based computing platforms. Our attack deploys the principles of return-oriented programming (ROP), however, in contrast to conventional ROP, it exploits jumps instead of returns, and hence it can not be detected by return address checkers. Although a similar attack has been recently proposed for Intel x86, it was u...
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system’s secur...
Return Oriented programming was surfaced first a decade ago, and was built to overcome the buffer exploit defense mechanisms like ASLR, DEP (or W^ X) by method of reusing the system code in the form of gadgets which are stitched together to make a Turing complete attack. And to perform Turing complete attack would require greater efforts which are quite complex, and there is very little researc...
The focus of this research is studying Return-Oriented Programming (ROP), which is a technique for exploiting software vulnerabilities. The reasons and motivations behind proposing ROP, the mechanism of working, automation tools, detection and prevention methods and new advances in ROP attacks are some of the important topics covered in this report.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید