Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers
(2023)
Presentation / Conference Contribution
The presence of instructions within executable programs is what makes the binaries executable. However, attackers leverage on the same to achieve some form of Control Flow Hijacking (CFH). Such code re-use attacks have also been found to lead to De... Read More about Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers.