【24h】

Targeting Physically Addressable Memory

机译:定位物理可寻址内存

获取原文
获取原文并翻译 | 示例

摘要

This paper introduces new advances in gaining unauthorised access to a computer by accessing its physical memory via various means. We will show a unified approach for using IEEE1394, also known as firewire, file descriptors and other methods to read from and write into a victim's memory. Thereafter we will show the power of this ability in several example attacks: stealing private SSH keys, and injecting arbitrary code in order to obtain interactive access with administrator privileges on the victim's computer. These advances are based on data structures that are required by the CPU to provide virtual address spaces for each process running on the system. These data structures are searched and parsed in order to reassemble pages scattered in physical memory, thus being able to read and write in each processes virtual address space.The attacks introduced in this paper are adaptable to all kinds of operating system and hardware combinations. As a sample target, we have chosen Linux on an IA-32 system with the kernel-options CONFIG_NOHIGH MEM or C0NFIG_HIGHMEM4G, C0NFIG_VMSPLIT_3G and CONFIG_PAGE_OFFSET= 0xC0000000.
机译:本文介绍了通过各种方式访问​​计算机的物理内存来获得对计算机的未授权访问的新进展。我们将展示一种使用IEEE1394的统一方法,也称为火线,文件描述符和其他方法来读取和写入受害者的内存。此后,我们将在几种示例攻击中展示此功能的强大功能:窃取SSH私钥,并注入任意代码以在受害人的计算机上获得具有管理员特权的交互式访问。这些进步是基于CPU所需的数据结构来为系统上运行的每个进程提供虚拟地址空间的。搜索和解析这些数据结构是为了重组散布在物理内存中的页面,从而能够在每个进程的虚拟地址空间中进行读写。本文介绍的攻击方法适用于各种操作系统和硬件组合。作为示例目标,我们选择了IA-32系统上的Linux,其内核选项为CONFIG_NOHIGH MEM或C0NFIG_HIGHMEM4G,C0NFIG_VMSPLIT_3G和CONFIG_PAGE_OFFSET = 0xC0000000。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号