Detection Method of ROP Attack for Cisco IOS

Cisco IOS (Internetwork Operating System) is a dedicated operating system for Cisco routers. Due to hardware constraints, it pays more attention to performance while ignoring system security, resulting in inability to effectively detect Return-Oriented Programming (ROP). Attacks. Aiming at the short...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Ji suan ji ke xue 2022-04, Vol.49 (4), p.369-375
Hauptverfasser: Li, Peng-yu, Liu, Sheng-li, Yin, Xiao-kang, Liu, Hao-hui
Format: Artikel
Sprache:chi
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Cisco IOS (Internetwork Operating System) is a dedicated operating system for Cisco routers. Due to hardware constraints, it pays more attention to performance while ignoring system security, resulting in inability to effectively detect Return-Oriented Programming (ROP). Attacks. Aiming at the shortcomings of traditional ROP protection technology in solving Cisco IOS protection, a method based on return address memory hash verification is proposed, which can effectively detect ROP attacks oriented to Cisco IOS, and analyze the ROP attack code. Capture. By analyzing the advantages and disadvantages of the existing protection mechanisms against ROP attacks, on the basis of the compact shadow memory protection idea, the traditional shadow memory storage mode is transformed into a hash-based memory search mode, and the return address memory pointer is added. As the index of hash lookup, the records of 's are used to improve the efficiency of shadow memory search, and at the same time, it can resist shadow memory
ISSN:1002-137X
DOI:10.11896/jsjkx.210300153