首页> 外文会议>International Conference on Parallel and Distributed Computing, Applications and Technologies >Parallelly Refill SLUB Objects Freed in Slow Paths: An Approach to Exploit the Use-After-Free Vulnerabilities in Linux Kernel
【24h】

Parallelly Refill SLUB Objects Freed in Slow Paths: An Approach to Exploit the Use-After-Free Vulnerabilities in Linux Kernel

机译:在慢速路径中释放并行重新填充单轴对象:一种利用Linux内核的无缺水漏洞的方法

获取原文

摘要

Recently since exploiting vulnerabilities in user application is becoming very difficult, vulnerabilities in Linux kernel have been paid more and more attention, especially the use-after-free vulnerabilities gained the most focus. However, there lacks a completion theory to exploit use-after-free vulnerabilities. The key to exploit UAF vulnerability is how to refill the freed object, because those days that the space just freed will be occupied firstly is gone. We propose a strategy to exploit the use-after-free vulnerabilities by continuously allocating objects. And to promote the efficiency and success rate, we present a technique by parallelly refilling objects with multiple threads and monitor. We also make a simulation experiment to verify the effectiveness of our theory. At last we give some mitigations to this attack.
机译:最近,由于利用用户应用程序的漏洞正在变得非常困难,因此Linux内核中的漏洞已经获得了越来越多的关注,尤其是使用余额漏洞最焦点。但是,缺乏剥削使用缺失的漏洞的完工理论。利用UAF漏洞的关键是如何重新填充释放物体,因为那些空间刚刚释放的日子将被占用。我们提出了一种通过不断分配对象来利用无缺水漏洞的策略。为促进效率和成功率,我们通过平行重新填充具有多个线程和监视器的对象来提出一种技术。我们还进行了模拟实验,以验证我们理论的有效性。最后,我们对此攻击提供了一些缓解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号