ROPocop — Dynamic mitigation of code-reuse attacks
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques; but nevertheless, new exploits that successfully bypass these technolog...
Uloženo v:
| Vydáno v: | Journal of information security and applications Ročník 29; s. 16 - 26 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier Ltd
01.08.2016
|
| Témata: | |
| ISSN: | 2214-2126 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques; but nevertheless, new exploits that successfully bypass these technologies still appear on a regular basis.
In this paper, we propose ROPocop, a novel approach for detecting and preventing the execution of injected code and for mitigating code-reuse attacks such as return-oriented programming (RoP). ROPocop uses dynamic binary instrumentation, requiring neither access to source code nor debug symbols or changes to the operating system. It mitigates attacks both by monitoring the program counter at potentially dangerous points and by detecting suspicious program flows.
We have implemented ROPocop for Windows x86 using PIN, a dynamic program instrumentation framework from Intel. Benchmarks using the SPEC CPU2006 suite show an average overhead of 2.4×, which is comparable to similar approaches, which give weaker guarantees. Real-world applications show only an initially noticeable input lag and no stutter. In our evaluation our tool successfully detected all 11 of the latest real-world code-reuse exploits, with no false alarms. Therefore, despite the overhead, it is a viable, temporary solution to secure critical systems against exploits if a vendor patch is not yet available. |
|---|---|
| AbstractList | Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques; but nevertheless, new exploits that successfully bypass these technologies still appear on a regular basis.
In this paper, we propose ROPocop, a novel approach for detecting and preventing the execution of injected code and for mitigating code-reuse attacks such as return-oriented programming (RoP). ROPocop uses dynamic binary instrumentation, requiring neither access to source code nor debug symbols or changes to the operating system. It mitigates attacks both by monitoring the program counter at potentially dangerous points and by detecting suspicious program flows.
We have implemented ROPocop for Windows x86 using PIN, a dynamic program instrumentation framework from Intel. Benchmarks using the SPEC CPU2006 suite show an average overhead of 2.4×, which is comparable to similar approaches, which give weaker guarantees. Real-world applications show only an initially noticeable input lag and no stutter. In our evaluation our tool successfully detected all 11 of the latest real-world code-reuse exploits, with no false alarms. Therefore, despite the overhead, it is a viable, temporary solution to secure critical systems against exploits if a vendor patch is not yet available. |
| Author | Follner, Andreas Bodden, Eric |
| Author_xml | – sequence: 1 givenname: Andreas surname: Follner fullname: Follner, Andreas email: andreas.follner@cased.de – sequence: 2 givenname: Eric surname: Bodden fullname: Bodden, Eric |
| BookMark | eNp9j0tOwzAURT0oEqV0A4yygQQ_x_lJTFD5FKlSEerc8ucFObRxZRukzlgEK2QlJJQRg-oN7pucq3suyKR3PRJyBTQDCuV1l3U2yIwNf0Yho5RNyJQx4CkDVp6TeQgdpRQYNAXLp4S_rJ-ddvvk-_MruTv0cmd1srPRvspoXZ-4NtHOYOrxPWAiY5T6LVySs1ZuA87_ckY2D_ebxTJdrR-fFrerVOecx7QsCjTAVFs1JleszRGwUVXBS8mh1lQx2RjGh1O0xkq3gGAoV6rm3OQ6n5H6WKu9C8FjK7SNv7Oil3YrgIrRWXRidBajs6AgBucBZf_Qvbc76Q-noZsjhIPTh0UvgrbYazTWo47COHsK_wFa_3Rq |
| CitedBy_id | crossref_primary_10_1016_j_cose_2020_101832 |
| Cites_doi | 10.1145/5666.5673 10.1145/2133375.2133377 10.1145/1609956.1609960 |
| ContentType | Journal Article |
| Copyright | 2016 Elsevier Ltd |
| Copyright_xml | – notice: 2016 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jisa.2016.01.002 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EndPage | 26 |
| ExternalDocumentID | 10_1016_j_jisa_2016_01_002 S221421261600017X |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS |
| ID | FETCH-LOGICAL-c344t-655ed12bf79d3b2f3e1e9b7546a418c0b2a9d24242b08e7cf1e1d04bb844d3c3 |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000379020800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2214-2126 |
| IngestDate | Sat Nov 29 04:06:22 EST 2025 Tue Nov 18 22:00:30 EST 2025 Fri Feb 23 02:18:25 EST 2024 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Code-reuse attack Return-oriented programming Exploit mitigation System security Buffer overflow Dynamic binary instrumentation |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c344t-655ed12bf79d3b2f3e1e9b7546a418c0b2a9d24242b08e7cf1e1d04bb844d3c3 |
| OpenAccessLink | https://inria.hal.science/hal-01140685v1/file/paper.pdf |
| PageCount | 11 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_jisa_2016_01_002 crossref_primary_10_1016_j_jisa_2016_01_002 elsevier_sciencedirect_doi_10_1016_j_jisa_2016_01_002 |
| PublicationCentury | 2000 |
| PublicationDate | August 2016 2016-08-00 |
| PublicationDateYYYYMMDD | 2016-08-01 |
| PublicationDate_xml | – month: 08 year: 2016 text: August 2016 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2016 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Bletsch, Jiang, Freeh, Liang (bib0020) 2011 Bubinas (bib0025) 2013 Zhang, Wei, Chen, Duan, Szekeres, McCamant (bib0155) 2013 Chen, Xu, Sezer, Gauriar, Iyer (bib0040) 2005 Gunn (bib0075) 2014 One (bib0115) 1996; 7 Cheng, Zhou, Yu, Ding, Deng (bib0045) 2014 Fleming, Wallace (bib0065) 1986; 29 Min, Jung, Lee, Chung (bib0110) 2012 Checkoway, Davi, Dmitrienko, Sadeghi, Shacham, Winandy (bib0035) 2010 Slowinska, Stancescu, Bos (bib0145) 2011 Slowinska, Stancescu, Bos (bib0150) 2012 Abadi, Budiu, Erlingsson, Ligatti (bib0010) 2009; 13 Butler (bib0030) 2004; 11 Shacham, Page, Pfaff, Goh, Modadugu, Boneh (bib0135) 2004 Göktaş, Athanasopoulos, Polychronakis, Bos, Portokalidis (bib0070) 2014 Hund, Willems, Holz (bib0085) 2013 Howard, Miller, Lambert, Thomlinson (bib0080) 2010 Microsoft (bib0100) Sinnadurai, Zhao, Wong (bib0140) 2008 Li, Szor (bib0090) 2013 Durden (bib0060) 2002; 11 Zhang, Sekar (bib0160) 2013 Luk, Cohn, Muth, Patil, Klauser, Lowney (bib0095) 2005 Pappas, Polychronakis, Keromytis (bib0120) 2013 Roemer, Buchanan, Shacham, Savage (bib0125) 2012; 15 Andersen, Abella (bib0015) 2004 Davi, Sadeghi, Winandy (bib0050) 2011 Davi, Sadeghi, Lehmann, Monrose (bib0055) 2014 Microsoft (bib0105) 2015 Shacham (bib0130) 2007 Cheng (10.1016/j.jisa.2016.01.002_bib0045) 2014 Luk (10.1016/j.jisa.2016.01.002_bib0095) 2005 Fleming (10.1016/j.jisa.2016.01.002_bib0065) 1986; 29 Hund (10.1016/j.jisa.2016.01.002_bib0085) 2013 Göktaş (10.1016/j.jisa.2016.01.002_bib0070) 2014 Microsoft (10.1016/j.jisa.2016.01.002_bib0100) Roemer (10.1016/j.jisa.2016.01.002_bib0125) 2012; 15 Durden (10.1016/j.jisa.2016.01.002_bib0060) 2002; 11 Checkoway (10.1016/j.jisa.2016.01.002_bib0035) 2010 Zhang (10.1016/j.jisa.2016.01.002_bib0160) 2013 Bletsch (10.1016/j.jisa.2016.01.002_bib0020) 2011 Shacham (10.1016/j.jisa.2016.01.002_bib0130) 2007 Sinnadurai (10.1016/j.jisa.2016.01.002_bib0140) 2008 Zhang (10.1016/j.jisa.2016.01.002_bib0155) 2013 Shacham (10.1016/j.jisa.2016.01.002_bib0135) 2004 Andersen (10.1016/j.jisa.2016.01.002_bib0015) Li (10.1016/j.jisa.2016.01.002_bib0090) Butler (10.1016/j.jisa.2016.01.002_bib0030) 2004; 11 Min (10.1016/j.jisa.2016.01.002_bib0110) 2012 Pappas (10.1016/j.jisa.2016.01.002_bib0120) 2013 Microsoft (10.1016/j.jisa.2016.01.002_bib0105) Slowinska (10.1016/j.jisa.2016.01.002_bib0145) 2011 Davi (10.1016/j.jisa.2016.01.002_bib0050) 2011 One (10.1016/j.jisa.2016.01.002_bib0115) 1996; 7 Chen (10.1016/j.jisa.2016.01.002_bib0040) 2005 Gunn (10.1016/j.jisa.2016.01.002_bib0075) Bubinas (10.1016/j.jisa.2016.01.002_bib0025) Slowinska (10.1016/j.jisa.2016.01.002_bib0150) 2012 Davi (10.1016/j.jisa.2016.01.002_bib0055) 2014 Howard (10.1016/j.jisa.2016.01.002_bib0080) Abadi (10.1016/j.jisa.2016.01.002_bib0010) 2009; 13 |
| References_xml | – volume: 29 start-page: 218 year: 1986 end-page: 221 ident: bib0065 article-title: How not to lie with statistics: the correct way to summarize benchmark results publication-title: Commun ACM – start-page: 40 year: 2011 end-page: 51 ident: bib0050 article-title: Ropdefender: a detection tool to defend against return-oriented programming attacks publication-title: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11 – volume: 7 year: 1996 ident: bib0115 article-title: Smashing the stack for fun and profit publication-title: Phrack – volume: 11 year: 2002 ident: bib0060 article-title: Bypassing pax aslr protection publication-title: Phrack – start-page: 376 year: 2012 end-page: 390 ident: bib0110 article-title: Jump oriented programming on windows platform (on the x86) publication-title: ICCSA (3), Vol. 7335 of Lecture Notes in Computer Science – year: 2011 ident: bib0145 article-title: Howard: a dynamic excavator for reverse engineering data structures publication-title: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6 February–9 February 2011 – year: 2015 ident: bib0105 article-title: Enhanced mitigation experience toolkit 5.5 beta user guide – year: 2008 ident: bib0140 article-title: Transparent runtime shadow stack: protection against malicious return address modifications – start-page: 12 year: 2005 ident: bib0040 article-title: Non-control-data attacks are realistic threats publication-title: Proceedings of the 14th Conference on USENIX Security Symposium — Volume 14, SSYM'05 – volume: 15 start-page: 2:1 year: 2012 end-page: 34 ident: bib0125 article-title: Return-oriented programming: systems, languages, and applications publication-title: ACM Trans Inform Syst Secur – start-page: 559 year: 2010 end-page: 572 ident: bib0035 article-title: Return-oriented programming without returns, CCS '10 – start-page: 190 year: 2005 end-page: 200 ident: bib0095 article-title: Pin: building customized program analysis tools with dynamic instrumentation publication-title: Proceedings of the 2005 ACM SIGPLAN Conference on Programming language design and implementation, PLDI '05 – start-page: 559 year: 2013 end-page: 573 ident: bib0155 article-title: Practical control flow integrity and randomization for binary executables publication-title: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13 – start-page: 447 year: 2013 end-page: 462 ident: bib0120 article-title: Transparent rop exploit mitigation using indirect branch tracing publication-title: Proceedings of the 22nd USENIX Conference on Security, SEC '13 – start-page: 401 year: 2014 end-page: 416 ident: bib0055 article-title: Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection publication-title: Proceedings of the 23rd USENIX Conference on Security, SEC'14 – start-page: 11 year: 2012 ident: bib0150 article-title: Body armor for binaries: preventing buffer overflows without recompilation publication-title: Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC '12 – year: 2013 ident: bib0090 article-title: Emerging stack pivoting exploits bypass common security – year: 2010 ident: bib0080 article-title: Windows isv software security defenses – start-page: 552 year: 2007 end-page: 561 ident: bib0130 article-title: The geometry of innocent flesh on the bone: return-into libc without function calls (on the x86) publication-title: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07 – start-page: 30 year: 2011 end-page: 40 ident: bib0020 article-title: Jump-oriented programming: a new class of code-reuse attack publication-title: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11 – year: 2013 ident: bib0025 article-title: Buffer overflows are the top software security vulnerability of the past 25 years – ident: bib0100 article-title: Data execution prevention – start-page: 417 year: 2014 end-page: 432 ident: bib0070 article-title: Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard publication-title: Proceedings of the 23rd USENIX Conference on Security Symposium, SEC '14 – year: 2014 ident: bib0045 article-title: Ropecker: a generic and practical approach for defending against ROP attacks publication-title: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23–26, 2014 – volume: 13 start-page: 4:1 year: 2009 end-page: 40 ident: bib0010 article-title: Control-flow integrity principles, implementations, and applications publication-title: ACM Trans Inform Syst Secur – year: 2004 ident: bib0015 article-title: Changes to functionality in Windows XP service pack 2 — part 3: memory protection technologies – volume: 11 year: 2004 ident: bib0030 article-title: Anonymous, Bypassing 3rd party windows buffer overflow protection publication-title: Phrack – year: 2014 ident: bib0075 article-title: Pwn2own 2014: a recap – start-page: 337 year: 2013 end-page: 352 ident: bib0160 article-title: Control flow integrity for cots binaries publication-title: Proceedings of the 22nd USENIX Conference on Security, SEC '13 – start-page: 191 year: 2013 end-page: 205 ident: bib0085 article-title: Practical timing side channel attacks against kernel space aslr publication-title: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13 – start-page: 298 year: 2004 end-page: 307 ident: bib0135 article-title: On the effectiveness of address-space randomization publication-title: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04 – start-page: 447 year: 2013 ident: 10.1016/j.jisa.2016.01.002_bib0120 article-title: Transparent rop exploit mitigation using indirect branch tracing – start-page: 30 year: 2011 ident: 10.1016/j.jisa.2016.01.002_bib0020 article-title: Jump-oriented programming: a new class of code-reuse attack – start-page: 11 year: 2012 ident: 10.1016/j.jisa.2016.01.002_bib0150 article-title: Body armor for binaries: preventing buffer overflows without recompilation – volume: 11 year: 2004 ident: 10.1016/j.jisa.2016.01.002_bib0030 article-title: Anonymous, Bypassing 3rd party windows buffer overflow protection publication-title: Phrack – ident: 10.1016/j.jisa.2016.01.002_bib0090 – ident: 10.1016/j.jisa.2016.01.002_bib0100 – start-page: 191 year: 2013 ident: 10.1016/j.jisa.2016.01.002_bib0085 article-title: Practical timing side channel attacks against kernel space aslr – year: 2011 ident: 10.1016/j.jisa.2016.01.002_bib0145 article-title: Howard: a dynamic excavator for reverse engineering data structures – start-page: 298 year: 2004 ident: 10.1016/j.jisa.2016.01.002_bib0135 article-title: On the effectiveness of address-space randomization – ident: 10.1016/j.jisa.2016.01.002_bib0025 – start-page: 552 year: 2007 ident: 10.1016/j.jisa.2016.01.002_bib0130 article-title: The geometry of innocent flesh on the bone: return-into libc without function calls (on the x86) – year: 2008 ident: 10.1016/j.jisa.2016.01.002_bib0140 – year: 2014 ident: 10.1016/j.jisa.2016.01.002_bib0045 article-title: Ropecker: a generic and practical approach for defending against ROP attacks – start-page: 190 year: 2005 ident: 10.1016/j.jisa.2016.01.002_bib0095 article-title: Pin: building customized program analysis tools with dynamic instrumentation – volume: 11 year: 2002 ident: 10.1016/j.jisa.2016.01.002_bib0060 article-title: Bypassing pax aslr protection publication-title: Phrack – start-page: 401 year: 2014 ident: 10.1016/j.jisa.2016.01.002_bib0055 article-title: Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection – volume: 7 year: 1996 ident: 10.1016/j.jisa.2016.01.002_bib0115 article-title: Smashing the stack for fun and profit publication-title: Phrack – ident: 10.1016/j.jisa.2016.01.002_bib0015 – start-page: 559 year: 2013 ident: 10.1016/j.jisa.2016.01.002_bib0155 article-title: Practical control flow integrity and randomization for binary executables – ident: 10.1016/j.jisa.2016.01.002_bib0075 – start-page: 376 year: 2012 ident: 10.1016/j.jisa.2016.01.002_bib0110 article-title: Jump oriented programming on windows platform (on the x86) – start-page: 12 year: 2005 ident: 10.1016/j.jisa.2016.01.002_bib0040 article-title: Non-control-data attacks are realistic threats – start-page: 559 year: 2010 ident: 10.1016/j.jisa.2016.01.002_bib0035 – ident: 10.1016/j.jisa.2016.01.002_bib0080 – start-page: 417 year: 2014 ident: 10.1016/j.jisa.2016.01.002_bib0070 article-title: Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard – start-page: 337 year: 2013 ident: 10.1016/j.jisa.2016.01.002_bib0160 article-title: Control flow integrity for cots binaries – volume: 29 start-page: 218 issue: 3 year: 1986 ident: 10.1016/j.jisa.2016.01.002_bib0065 article-title: How not to lie with statistics: the correct way to summarize benchmark results publication-title: Commun ACM doi: 10.1145/5666.5673 – volume: 15 start-page: 2:1 issue: 1 year: 2012 ident: 10.1016/j.jisa.2016.01.002_bib0125 article-title: Return-oriented programming: systems, languages, and applications publication-title: ACM Trans Inform Syst Secur doi: 10.1145/2133375.2133377 – volume: 13 start-page: 4:1 issue: 1 year: 2009 ident: 10.1016/j.jisa.2016.01.002_bib0010 article-title: Control-flow integrity principles, implementations, and applications publication-title: ACM Trans Inform Syst Secur doi: 10.1145/1609956.1609960 – start-page: 40 year: 2011 ident: 10.1016/j.jisa.2016.01.002_bib0050 article-title: Ropdefender: a detection tool to defend against return-oriented programming attacks – ident: 10.1016/j.jisa.2016.01.002_bib0105 |
| SSID | ssj0001219523 |
| Score | 2.0639172 |
| Snippet | Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years.... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 16 |
| SubjectTerms | Buffer overflow Code-reuse attack Dynamic binary instrumentation Exploit mitigation Return-oriented programming System security |
| Title | ROPocop — Dynamic mitigation of code-reuse attacks |
| URI | https://dx.doi.org/10.1016/j.jisa.2016.01.002 |
| Volume | 29 |
| WOSCitedRecordID | wos000379020800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 2214-2126 databaseCode: AIEXJ dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0001219523 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT9wwFLZGQw-9UCit2OVDb1FQ7NhZjohFLaoAVXOYW2Q7jsRomoxmAuLYH8Ev5JfwHDuLaEHlwMWKLC-JP_u9l-e3IPRNMJEEytjpAO_xWRJwX8hY-WnOiRbwB8BlE2f2Z3x5mUyn6fVodNH6wtzN47JM7u_TxbtCDXUAtnGdfQPc3aBQAc8AOpQAO5T_Bfyvq-tKVQuvNWNg3qnNOu_9vrEBNayIaJzZ_aW-XWlP1LVxtX9BUHWxVZt-K5fuzsZ4HVx-99xsPnc-NI2tpOjV8FVL4wztHWobSNTZujmiRClhPrC7aEhBnc7CkkASDZipbfcXmbYag9nRzFzYm2ma0KkB7ZlSexH_jFd1FoStcdosM2NkZowsIFkTV3SNxjxNxmjt-MfZ9GKgcSMpb_L9dR_hvKiswd_zl_m3pDKQPiYbaN2hgY8t3JtopMvP6FObkgM7Cr2FmEMfP_55wA533OOOqwL3uGOH-xc0OT-bnHz3XWIMX4WM1X7Euc4JlUWc5qGkRaiJTmXMWSQYSVQgqUhz4_dDZZDoWBVEkzxgUiaM5aEKv6JxWZV6G-EIyHchRRjCSAyaSji2eVREFA52ECu-g0i7BplyQeNN7pJ59jIAO8jr-ixsyJRXW_N2aTMn9FlhLoPN8kq_3TfNsoc-9rt5H43r5a0-QB_UXX2zWh66nfIEiVh2ZQ |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ROPocop+%E2%80%94+Dynamic+mitigation+of+code-reuse+attacks&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Follner%2C+Andreas&rft.au=Bodden%2C+Eric&rft.date=2016-08-01&rft.issn=2214-2126&rft.volume=29&rft.spage=16&rft.epage=26&rft_id=info:doi/10.1016%2Fj.jisa.2016.01.002&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2016_01_002 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |