首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
【24h】

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

机译:在二元可执行文件中自动发现抗碰撞基元

获取原文

摘要

Many modern defenses rely on address space layout randomization (ASLR) to efficiently hide security-sensitive metadata in the address space. Absent implementation flaws, an attacker can only bypass such defenses by repeatedly probing the address space for mapped (security-sensitive) regions, incurring a noisy application crash on any wrong guess. Recent work shows that modern applications contain idioms that allow the construction of crash-resistant code primitives, allowing an attacker to efficiently probe the address space without causing any visible crash. In this paper, we classify different crash-resistant primitives and show that this problem is much more prominent than previously assumed. More specifically, we show that rather than relying on labor-intensive source code inspection to find a few "hidden" application-specific primitives, an attacker can find such primitives semi-automatically, on many classes of real-world programs, at the binary level. To support our claims, we develop methods to locate such primitives in real-world binaries. We successfully identified 29 new potential primitives and constructed proof-of-concept exploits for four of them.
机译:许多现代防御依赖于地址空间布局随机化(ASLR),以有效地隐藏地址空间中的安全敏感元数据。缺乏实施缺陷,攻击者只能通过反复探测映射(安全敏感)地区的地址空间来绕过这些防御,在任何错误的猜测中产生嘈杂的应用程序崩溃。最近的工作表明,现代应用程序包含允许建造碰撞码原语的成语,允许攻击者有效地探测地址空间而不会导致任何可见的崩溃。在本文中,我们分类了不同的崩溃原语,并表明这个问题比以前假设的更突出。更具体地说,我们表明,而不是依靠劳动密集型的源代码检查来查找一些“隐藏”的应用程序特定的原语,攻击者可以在二进制中发现许多类的真实计划中的那种原语。等级。为了支持我们的索赔,我们开发方法来定位现实世界二进制文件中的此类原语。我们成功地确定了29个新的潜在基元,并为其中四个构建了概念验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号