首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
【24h】

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

机译:致力于在二进制可执行文件中自动发现耐崩溃的基元

获取原文

摘要

Many modern defenses rely on address space layout randomization (ASLR) to efficiently hide security-sensitive metadata in the address space. Absent implementation flaws, an attacker can only bypass such defenses by repeatedly probing the address space for mapped (security-sensitive) regions, incurring a noisy application crash on any wrong guess. Recent work shows that modern applications contain idioms that allow the construction of crash-resistant code primitives, allowing an attacker to efficiently probe the address space without causing any visible crash. In this paper, we classify different crash-resistant primitives and show that this problem is much more prominent than previously assumed. More specifically, we show that rather than relying on labor-intensive source code inspection to find a few "hidden" application-specific primitives, an attacker can find such primitives semi-automatically, on many classes of real-world programs, at the binary level. To support our claims, we develop methods to locate such primitives in real-world binaries. We successfully identified 29 new potential primitives and constructed proof-of-concept exploits for four of them.
机译:许多现代防御都依靠地址空间布局随机化(ASLR)来有效地将安全敏感的元数据隐藏在地址空间中。缺少实现上的缺陷,攻击者只能通过反复探测映射的(对安全性敏感的)区域的地址空间来绕过此类防御,从而在任何错误的猜测中导致嘈杂的应用程序崩溃。最近的工作表明,现代应用程序包含一些惯用法,这些惯用法允许构造耐崩溃的代码基元,从而使攻击者可以有效地探查地址空间而不会引起任何可见的崩溃。在本文中,我们对不同的耐碰撞原语进行了分类,并表明此问题比以前假设的要突出得多。更具体地说,我们表明,攻击者无需依赖劳动密集型源代码检查来找到一些“隐藏”的特定于应用程序的基元,而是可以在许多实际程序中以二进制方式半自动找到此类基元。等级。为了支持我们的主张,我们开发了在实际二进制文件中定位此类图元的方法。我们成功地确定了29个新的潜在原语,并为其中四个构建了概念验证漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号