首页> 外文会议>IEEE European Symposium on Security and Privacy >Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
【24h】

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

机译:与位置无关的代码重用:没有信息公开时ASLR的有效性

获取原文

摘要

Address-space layout randomization is a wellestablished defense against code-reuse attacks. However, it can be completely bypassed by just-in-time code-reuse attacks that rely on information disclosure of code addresses via memory or side-channel exposure. To address this fundamental weakness, much recent research has focused on detecting and mitigating information disclosure. The assumption being that if we perfect such techniques, we will not only maintain layout secrecy but also stop code reuse. In this paper, we demonstrate that an advanced attacker can mount practical code-reuse attacks even in the complete absence of information disclosure. To this end, we present Position-Independent Code-Reuse Attacks, a new class of codereuse attacks relying on the relative rather than absolute location of code gadgets in memory. By means of memory massaging, the attacker first makes the victim program generate a rudimentary ROP payload (for instance, containing code pointers that target instructions "close" to relevant gadgets). Afterwards, the addresses in this payload are patched with small offsets via relative memory writes. To establish the practicality of such attacks, we present multiple Position-Independent ROP exploits against real-world software. After showing that we can bypass ASLR in current systems without requiring information disclosures, we evaluate the impact of our technique on other defenses, such as fine-grained ASLR, multi-variant execution, execute-only memory and re-randomization. We conclude by discussing potential mitigations.
机译:地址空间布局随机化是一种针对代码重用攻击的完善防御措施。但是,实时代码重用攻击可以完全绕过它,该攻击依赖于通过内存或边信道暴露导致的代码地址信息泄露。为了解决这一基本弱点,最近的许多研究都集中在检测和缓解信息泄露上。假设是,如果我们完善这样的技术,我们不仅将保持布局的保密性,还将停止代码的重用。在本文中,我们证明了即使在完全不公开信息的情况下,高级攻击者也可以发起实用的代码重用攻击。为此,我们提出了位置无关的代码重用攻击,这是一类新的代码重用攻击,它依赖于代码小工具在内存中的相对位置而不是绝对位置。通过内存按摩,攻击者首先使受害者程序生成基本的ROP有效负载(例如,包含针对“接近”相关小工具的指令的代码指针)。然后,通过相对内存写入以较小的偏移量修补此有效负载中的地址。为了确定此类攻击的实用性,我们针对现实世界的软件提出了多种与位置无关的ROP攻击。在证明我们可以在当前系统中绕过ASLR而不需要公开信息之后,我们评估了我们的技术对其他防御的影响,例如细粒度的ASLR,多变量执行,仅执行的内存和重新随机化。最后,我们讨论潜在的缓解措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号