首页> 外文会议>International Conference on Parallel and Distributed Computing, Applications and Technologies >Parallelly Refill SLUB Objects Freed in Slow Paths: An Approach to Exploit the Use-After-Free Vulnerabilities in Linux Kernel
【24h】

Parallelly Refill SLUB Objects Freed in Slow Paths: An Approach to Exploit the Use-After-Free Vulnerabilities in Linux Kernel

机译:通过慢速路径释放的并行重新填充SLUB对象:一种利用Linux内核中的“使用后释放”漏洞的方法

获取原文

摘要

Recently since exploiting vulnerabilities in user application is becoming very difficult, vulnerabilities in Linux kernel have been paid more and more attention, especially the use-after-free vulnerabilities gained the most focus. However, there lacks a completion theory to exploit use-after-free vulnerabilities. The key to exploit UAF vulnerability is how to refill the freed object, because those days that the space just freed will be occupied firstly is gone. We propose a strategy to exploit the use-after-free vulnerabilities by continuously allocating objects. And to promote the efficiency and success rate, we present a technique by parallelly refilling objects with multiple threads and monitor. We also make a simulation experiment to verify the effectiveness of our theory. At last we give some mitigations to this attack.
机译:近来,由于利用用户应用程序中的漏洞变得非常困难,因此Linux内核中的漏洞已受到越来越多的关注,尤其是“售后使用”漏洞成为了关注的焦点。但是,缺乏一种利用“事后使用”漏洞的完成理论。利用UAF漏洞的关键是如何重新填充释放的对象,因为那些刚刚释放的空间将首先被占用的日子已经过去。我们提出了一种通过连续分配对象来利用无用后漏洞的策略。为了提高效率和成功率,我们提出了一种通过多线程和监视器并行重新填充对象的技术。我们还进行了仿真实验,以验证我们理论的有效性。最后,我们对此攻击进行了一些缓解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号