dewdrop: Find gadgets for return-oriented programming on x86
Traditional buffer-overflow attacks work by filling a data buffer with exploit code and then redirecting execution to that buffer. As a countermeasure, modern operating systems will forbid (by default) the execution of writable memory regions.
Return-oriented programming  is an alternative exploitation strategy that works around this restriction. The exploit payload is built by chaining together short code sequences ("gadgets") which are already present in the exploited program, and thus are allowed to be executed.
dewdrop is a Haskell library for finding useful gadgets in 32- and 64-bit
x86 ELF binaries. You can describe the desired gadget properties with a
Haskell function, and use the
Dewdrop module to make a customized
gadget-finder program. Or you can import
Dewdrop.Analyze and integrate
this functionality into a larger program.
\[1\] Shacham, Hovav. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). CCS 2007, pages 552-561.
|Dependencies||base (>=3 && <5), bytestring (>=0.9), containers (>=0.3), elf (>=0.2), hdis86 (>=0.2), syb (>=0.1) [details]|
|Author||Nelson Elhage <email@example.com>, Keegan McAllister <firstname.lastname@example.org>|
|Maintainer||Keegan McAllister <email@example.com>|
|Category||Reverse Engineering, Security|
|Source repo||head: git clone git://github.com/kmcallister/dewdrop.git|
|Uploaded||by KeeganMcAllister at Sun Aug 28 19:07:37 UTC 2011|
|Downloads||689 total (7 in the last 30 days)|
|Rating||(no votes yet) [estimated by rule of succession]|
Docs uploaded by user
Build status unknown [no reports yet]
For package maintainers and hackage trustees