This paper shows how the Xtensa architecture can be attacked with Return-Oriented-Programming (ROP). The presented techniques include possibilities for both supported Application Binary Interfaces (ABIs). Especially for the windowed ABI a powerful mechanism is presented that not only allows to jump to gadgets but also to manipulate registers without relying on specific gadgets. This paper purely focuses on how the properties of the architecture itself can be exploited to chain gadgets and not on specific attacks or a gadget catalog.
翻译:本文展示了 Xtensa 结构如何能以返回方向- 方案( ROP) 来攻击 Xtensa 结构。 介绍的技术包括两种支持的应用二进制界面( ABI) 的可能性。 特别是对于窗口型 ABI 来说, 展示了一种强大的机制, 不仅允许跳跃到装置上, 还可以在不依赖特定工具的情况下操控登记册。 本文仅侧重于如何将建筑本身的特性用于链条工具, 而不是具体攻击或工具目录 。