首页> 外文会议>International ISC Conference on Information Security and Cryptology >Patulous Code Reuse Attack: A novel code reuse attack on ARM architecture (A proof of concept on Android OS)
【24h】

Patulous Code Reuse Attack: A novel code reuse attack on ARM architecture (A proof of concept on Android OS)

机译:扩展代码重用攻击:一种针对ARM体系结构的新颖代码重用攻击(在Android OS上的概念证明)

获取原文

摘要

Nowadays, widespread growth in popularity of embedded devices, especially smart phones, stimulates many attackers to consider mobile devices as an attractive target platform. Among all various types of threats and attacks on smart phones, Code Reuse Attack (CRA) techniques are sparkling. Since the introduction of CRA techniques, many attack models have been proposed on different architectures and platforms (e.g. x86, SPARC, etc.). While the standard platform for embedded devices is ARM architecture, we concentrate on available ARM based CRAs. The main contribution of this paper is to consider some unique aspects of ARM architecture to provide a novel code reuse attack technique called Patulous Code Reuse Attack (PCRA) rather than currently available ROP and BLX-attacks. Our attack exploits all of the available machine instructions that change Program Counter (PC) register to deploy the principles of ROP convention. We demonstrate the effectiveness of our approach by defining three different submodels and introducing a useful set of gadgets as well as a sample proof of concept exploit on Android 5.0.1 platform.
机译:如今,嵌入式设备(尤其是智能手机)的广泛普及促使许多攻击者将移动设备视为有吸引力的目标平台。在智能手机上的各种威胁和攻击中,代码重用攻击(CRA)技术正在不断涌现。自从引入CRA技术以来,已经在不同的体系结构和平台(例如x86,SPARC等)上提出了许多攻击模型。尽管嵌入式设备的标准平台是ARM体系结构,但我们专注于基于ARM的可用CRA。本文的主要贡献是考虑了ARM体系结构的一些独特方面,以提供一种新颖的代码重用攻击技术,称为Patulous代码重用攻击(PCRA),而不是当前可用的ROP和BLX攻击。我们的攻击利用了更改程序计数器(PC)寄存器以部署ROP约定原理的所有可用机器指令。我们通过定义三个不同的子模型并引入一组有用的小工具以及在Android 5.0.1平台上进行概念开发的示例来证明我们的方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号