首页> 外文会议>Annual IEEE/ACM International Symposium on Microarchitecture >Jump over ASLR: Attacking branch predictors to bypass ASLR
【24h】

Jump over ASLR: Attacking branch predictors to bypass ASLR

机译:跳过ASLR:攻击分支预测变量以绕过ASLR

获取原文

摘要

Address Space Layout Randomization (ASLR) is a widely-used technique that protects systems against a range of attacks. ASLR works by randomizing the offset of key program segments in virtual memory, making it difficult for an attacker to derive the addresses of specific code objects and consequently redirect the control flow to this code. In this paper, we develop an attack to derive kernel and user-level ASLR offset using a side-channel attack on the branch target buffer (BTB). Our attack exploits the observation that an adversary can create BTB collisions between the branch instructions of the attacker process and either the user-level victim process or on the kernel executing on its behalf. These collisions, in turn, can impact the timing of the attacker's code, allowing the attacker to identify the locations of known branch instructions in the address space of the victim process or the kernel. We demonstrate that our attack can reliably recover kernel ASLR in about 60 milliseconds when performed on a real Haswell processor running a recent version of Linux. Finally, we describe several possible protection mechanisms, both in software and in hardware.
机译:地址空间布局随机化(ASLR)是一种广泛使用的技术,可以保护系统免受一系列攻击。 ASLR通过随机化虚拟程序中关键程序段的偏移量来工作,从而使攻击者难以派生特定代码对象的地址,并因此将控制流重定向到该代码。在本文中,我们开发了一种对分支目标缓冲区(BTB)进行侧信道攻击的攻击,以导出内核和用户级ASLR偏移。我们的攻击利用了一种观察结果,即对手可以在攻击者进程的分支指令与用户级受害者进程或代表其执行的内核之间创建BTB冲突。这些冲突继而可能影响攻击者代码的时间安排,从而使攻击者能够识别受害者进程或内核的地址空间中已知分支指令的位置。我们证明,在运行最新版本Linux的真正Haswell处理器上执行攻击后,我们的攻击可以在大约60毫秒内可靠地恢复内核ASLR。最后,我们描述了几种可能的保护机制,包括软件和硬件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号