首页> 外文会议>Annual Conference on Privacy, Security and Trust >On Return Oriented Programming Threats in Android Runtime
【24h】

On Return Oriented Programming Threats in Android Runtime

机译:Android Runtime中面向返回的编程威胁

获取原文

摘要

Android has taken a large share of operating systems for smart devices including smartphones, and has been an attractive target to the attackers. The arms race between attackers and defenders typically occurs on two front lines — the latest attacking technology and the latest updates to the operating system (including defense mechanisms deployed). In terms of attacking technology, Return-Oriented Programming (ROP) is one of the most sophisticated attack methods on Android devices. In terms of the operating system updates, Android Runtime (ART) was the latest and biggest change to the Android family. In this paper, we investigate the extent to which Android Runtime (ART) makes Return-Oriented Programming (ROP) attacks easier or more difficulty. In particular, we show that by updating system libraries and adopting Ahead-of-Time compiling instead of Justin- Time compiling in the ART architecture, a larger number and more diverse gadgets are disclosed to ROP attackers, which serve as direct ingredients to ROP attacks. We show that between three and six times more gadgets are found on the ART adopted versions of Android due to the new ART runtime. Moreover, in constrained situations where an attacker requires specific instructions and target registers, Android running ART provides up to 30% more conditional coverage than pre-ART Android does. We additionally demonstrate a sample ROP attack on post- ART Android that would not have been possible on pre-ART Android.
机译:Android已在包括智能手机在内的智能设备中占据了很大份额的操作系统,并且已成为攻击者的诱人目标。攻击者与防御者之间的军备竞赛通常发生在两条最前沿:最新的攻击技术和操作系统的最新更新(包括部署的防御机制)。就攻击技术而言,面向返回的编程(ROP)是Android设备上最复杂的攻击方法之一。就操作系统更新而言,Android Runtime(ART)是Android系列的最新,最大的变化。在本文中,我们研究了Android Runtime(ART)在多大程度上使面向返回的编程(ROP)攻击变得更容易或更困难。特别是,我们显示出,通过更新系统库并在ART体系结构中采用“提前编译”而不是“贾斯汀及时”编译,可以向ROP攻击者披露更多和更多种类的小工具,它们是ROP攻击的直接组成部分。我们显示由于新的ART运行时,在采用ART的Android版本上发现的小工具多了三到六倍。此外,在攻击者需要特定指令和目标寄存器的局限性情况下,运行ART的Android提供的条件覆盖率要比ART之前的Android高30%。此外,我们还演示了在ART后的Android上进行的示例ROP攻击,这在ART前的Android上不可能实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号