What are some steps that individuals or organizations can take to protect themselves from return oriented programming attacks?
Some steps or defense that individuals or organizations
can take to protect themselves from Return Oriented Programming
(ROP) attacks are:
In general, it requires to maintain Control Flow Integrity
(CFI) to defend against ROP attacks.
* G-Free: It is a technique and a practical
solution to defend and fight against any potential form of ROP. It
removes or rules out all unaligned free-branch instructions within
a binary executable, and safe-guards from attackers preventing them
from using the free-branch instructions. Also, it verifies the
authenticity of function calls appending a validation block. In
case it does not find the desired result, G-Free causes application
crashing.
* Address Space Layout Randomization (ASLR): This
defense, in general, requires randomizing the location of program
and library code, making attackers unable to accurately predict
instructions; locations that could be useful in gadgets and hence,
would not be able to mount a successful return-oriented programming
attack chain. This defense loads shared libraries into different
memory locations for every program load.
Defense: Randomization of the code's location using ASLR, compiling
for position independence on a 64-bit machine, making attacks very
difficult.
* SEHOP: SEHOP is the acronym for Structured
Exception Handler Overwrite Protection. It is a feature of Windows
OS protecting, defending, and safeguarding against stack overflow
attacks and structured exception handler attacks.
* Binary Code Randomization: This defense is
applicable for network interfaces and system programming. Binary
Randomization is used in a software update system. For all the
updated devices, the Cloud-based service would introduce variations
to code, performs online compilation, and dispatch the binary. This
defense is very effective.
* W^X: This defense is carried out in
organizations by developers or defenders. The stack memory (stack
or heap) would have to be made non-executable (NX) or No-eXecute,
called Data Execution Prevention (DEP), preventing the injection of
code on the stack. This technique is a security feature where pages
in a process' memory are made either, writable or executable, but
never both.
For the attacks, attackers carry out without injecting code by
jumping or returning to libc using system command. In order to
prevent and defend this, defenders hide the address of the desired
libc code or return address using Address Space Layout
Randomization (ASLR).
Defense: Defenders could stop using libc code altogether, but
rather use code in the program text.
* Against control flow attacks: In this defense,
both, organizations and individuals using Internet of Things (IoT)
devices and gadgets made of small embedded systems, could use
Instruction Based Memory Access Control (IB-MAC) implemented
hardware, thus protecting such low-cost embedded systems against
malicious control flow and stack overflow attacks.
* Against return-oriented rootkits defense.
* Pointer Authentication Codes (PAC): This defense
can be carried out by individuals who are using the latest iPhone
A12 chips which are upgraded to ARMv8.3, which uses PACs. The
ARMv8.3-A architecture holds a hardware level new feature,
exploiting unused bits in the pointer address space to
cryptographically sign pointer addresses. The signature is checked
before jumping to a pointer. The check fails, in case, an error is
encountered.
In general, in this case, the defense would be to ensure to have
memory safety which is useful and use of
memory safe programming languages.
* One could use an automated defense called control-flow
integrity but would be available in the near future.
What are some steps that individuals or organizations can take to protect themselves from return oriented...
Explain the steps authitor can take to protect themselves against failure to detect fraud.
What are some financial practices that a construction company can take to protect themselves against interest rate risk? Which do you think are the best strategies? Why?
What is the impact of network attacks on the operation of an organization? What are some key steps organizations can take to help protect their networks and resources? Have you actually worked for an organization or know of one where the network was compromised? If so, what was the impact on the organization and what did it do about it? What steps can you take to protect your own PC or laptop computer?
Explain how interest rates, inflation, and market psychology affect foreign exchange. How can organizations protect themselves from foreign exchange volatility. Apply to any currency of your choice. When referring to interest rate, please differentiate real interest rates from nominal interest rates, short-term vs. long-term effect.
Can you take steps to protect data when using the Google search engine? What are a few measures you can use to protect your data?
What are the auditing challenges associated with reverse mergers? How can investors protect themselves from the liabilities that may be contained in corporate shells?
What can agents do to protect themselves from liability for the acts of the principal? Consider and discuss the alternatives and possibilities. Defend your position. Make at least 100-150 words, thank you.
2. How can MNCs protect themselves from government action?
How can bondholders protect themselves from managers’ actions that negatively impact bondholders?
What are some of the underlying motivations that prompt individuals to agree to requests that do not directly benefit themselves or their organizations? Explain in your own words.