Peraton Labs
  • About
    • Our Story
    • Markets we serve
    • Leadership
    • Contact us
    • Visit peraton.com →
  • Research
    • 5G
    • Cybersecurity
    • Electronic warfare
    • Machine learning and data analytics
    • Mobility
    • Optical, photonics and quantum
    • Wireless systems and networks
  • Services
    • Critical infrastructure
    • Networking and cloud
    • Service and data assurance
    • Other services
  • Products
    • Critical infrastructure
    • Cybersecurity
    • Network defense
    • Spectrum solutions
    • Wireless solutions
    • Other products
  • News and media
    • Events
    • Highlights >
      • Improving Power Grid Physical Security
      • CLOSURE Toolchain for Cross-Domain Solutions
      • Peraton Labs Supports Cyber Exercise for Nebraska Army National Guard
      • Conceptual Simulation for Designing High Performance Computers
      • FLEET: Reconfigurable Optical NICs for Fast Data Transfer
      • Turbocharge Simulation
      • Analytics and AI for Predictive Maintenance
      • Minimizing the Cyberattack Surface
    • Press releases
    • Media hits
  • Careers
    • Life at the Labs
    • Tackling Tomorrow's Challenges
  • Search
Our products > Cybersecurity ​> Return oriented programming (ROP) Protector 

Return oriented programming (ROP) Protector

A radical defense solution that protects legacy software systems from ROP cyberattacks

ROP Protector is a radical defense solution that protects legacy systems from ROP cyberattacks. The cybersecurity playing field is fundamentally asymmetric. Attackers can easily identify weaknesses in a target system as soon as they have access to its code and configuration. As a result, defenders are perpetually playing a game of catch-up after an attack has occurred to secure their systems. 
​
The ROP attack technique effectively uses code already present within the target system to carry out the attack. ROP attackers harness software components within the legacy system, commonly referred to as gadgets, to carry out the attack. Once devised, ROP attacks are easy to carry out since they rely on the target system being static. ROP Protector is an efficient and practical solution to the ROP defense needs of legacy systems. 

Jump to

​How it works
Features
​
​Advantages
Resources
Research and products of interest
​Request more information
Picture
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com/?data-scroll-to-anchor=HowItWorks
Copy for linking from an external page:
https://www.peratonlabs.com/?data-anchor-link=HowItWorks

How it works

​ROP cyberattacks are easy to accomplish because target systems are essentially static. ROP Protector is a moving target defense solution which ensures that the target system itself is dynamic—preventing attacks that aim to leverage static gadgets within the system. ROP Protector creates a morphed version of the target system that has exactly the same set of capabilities as the original yet does not have the gadgets that the ROP attack depends on. 

ROP Protector is a pure binary-to-binary code scrambling solution. It does not require access to the source code for the protected system. It ensures that gadgets needed to facilitate a typical ROP attack are not available for use by an attacker. Importantly, studies have shown that well-known applications (e.g., the Apache webserver) transformed by ROP Protector have comparable performance to their original versions.  

ROP Protector is particularly valuable in the case of legacy systems for which source code is unavailable since it is a pure binary-to-binary code scrambling solution. Studies have shown that neither the capabilities nor the performance of well-known applications (e.g. the Apache webserver) are impacted after being scrambled by ROP Protector. Thus, ROP Protector is an efficient and practical capability for the ROP defense needs of legacy systems. 
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=features
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=features

Features

  • Binary-to-binary code scrambling: protects software without the need of source code. This is extremely valuable for legacy and proprietary software systems where source may not be available 
  • Robust defense: defends against return-oriented programming attacks not just by scrambling the software, but also by creating multiple unique variants of software. By switching out these variants on each invocation, an attacker is unable to get a foothold—attackers require multiple gadgets to execute an attack; hence, even if they are able to find one gadget in a variant, that gadget will have moved or not be present in another variant 
Picture
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com/?data-scroll-to-anchor=Advantages
Copy for linking from an external page:
https://www.peratonlabs.com/?data-anchor-link=Advantages

Advantages

  • A vulnerable system is protected against ROP attacks without new development effort 
  • Protection is achieved without exposing underlying intellectual property in source code 
  • System performance is not impacted 
  • Protection is built into the target system—no new components are added 
  • Defends by preventing the attack instead of acting in response to it 
  • Operation is transparent to end users 
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=resources
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=resources

Resources

Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com/?data-scroll-to-anchor=links
Copy for linking from an external page:
https://www.peratonlabs.com/?data-anchor-link=links

Research and products of interest

Research

  • Cybersecurity research: innovations to protect mission-critical networks, services, systems and infrastructure 

Products

  • Cyber Virtual Assured Network (CyberVAN™): high-fidelity network environment for cyber experimentation, operational planning, validation and training
  • Distributed, Assured and Dynamic Configuration (DADC™)​: efficient, secure and accurate cyber infrastructure design
  • DDoS Defender™: defend essential infrastructure from DDoS attacks to maintain critical services
  • Distributed Enclave Defense Using Configurable Edges (DEDUCE): rapid service restoration and situational awareness from the network edges
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=requestinfo
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=requestinfo

Request more information
Contact us
​About
​Research
​Services
Products
​Careers
​
News and media

peraton.com
Markets we serve:
Defense
Energy
​
Financial
Government 
Life sciences 
Telecommunications
Transportation
​
Picture
© 2022 Peraton Labs.  Site map | Terms of use | Privacy policy
  • About
    • Our Story
    • Markets we serve
    • Leadership
    • Contact us
    • Visit peraton.com →
  • Research
    • 5G
    • Cybersecurity
    • Electronic warfare
    • Machine learning and data analytics
    • Mobility
    • Optical, photonics and quantum
    • Wireless systems and networks
  • Services
    • Critical infrastructure
    • Networking and cloud
    • Service and data assurance
    • Other services
  • Products
    • Critical infrastructure
    • Cybersecurity
    • Network defense
    • Spectrum solutions
    • Wireless solutions
    • Other products
  • News and media
    • Events
    • Highlights >
      • Improving Power Grid Physical Security
      • CLOSURE Toolchain for Cross-Domain Solutions
      • Peraton Labs Supports Cyber Exercise for Nebraska Army National Guard
      • Conceptual Simulation for Designing High Performance Computers
      • FLEET: Reconfigurable Optical NICs for Fast Data Transfer
      • Turbocharge Simulation
      • Analytics and AI for Predictive Maintenance
      • Minimizing the Cyberattack Surface
    • Press releases
    • Media hits
  • Careers
    • Life at the Labs
    • Tackling Tomorrow's Challenges
  • Search