首页> 外文会议>International Conference on Information and Communications Security >Return-Oriented Rootkit without Returns (on the x86)
【24h】

Return-Oriented Rootkit without Returns (on the x86)

机译:返回返回的rootkit而不返回(在x86上)

获取原文
获取外文期刊封面目录资料

摘要

Return Oriented Programming (ROP) is a new technique which can be leveraged to construct a rootkit by reusing the existing code within the kernel. Such ROP rootkit can be designed to evade existing kernel integrity protection mechanism. In this paper, we show that, it is also possible to mount a new type of return-oriented programming rootkit without using any return instructions on x86 platform. Our new attack makes use of certain instruction sequences ending in jmp instead of ret; we show that these sequences occur with sufficient frequency in OS kernel, thereby enabling to construct arbitrary x86 behaviors. Since it does not make use of return instructions, our new attack has negative implications for existing defense methods against traditional ROP attack. Further, we present a design of memory layout arrangement technique for this type of ROP rootkit, whose size is not limited by the kernel stack. Finally, we propose the implementation of this practical attack to demonstrate the feasibility and effectiveness of our approach.
机译:返回面向导向的编程(ROP)是一种新技术,可以通过重用内核中的现有代码来利用来构造rootkit。这种ROP Rootkit可以旨在避免现有的内核完整性保护机制。在本文中,我们表明,在不使用X86平台上的任何返回指令,还可以安装新类型的返回方面的编程rootkit。我们的新攻击利用以JMP而不是RET结尾的某些指令序列;我们表明这些序列以足够的频率发生在OS内核中,从而使得能够构建任意X86行为。由于它没有利用退货指示,我们的新攻击对现有防御方法免于传统的ROP攻击具有负面影响。此外,我们为此类型的ROP rootkit提供了存储器布局布置技术的设计,其大小不受核堆栈的限制。最后,我们建议实施这种实际攻击,以展示我们方法的可行性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号