【24h】

On the Effectiveness of Address-Space Randomization

机译:论地址空间随机化的有效性

获取原文

摘要

Address-space randomization is a technique used to fortify systems against buffer overflow attacks. The idea is to introduce artificial diversity by randomizing the memory location of certain system components. This mechanism is available for both Linux (via PaX ASLR) and OpenBSD. We study the effectiveness of address-space randomization and find that its utility on 32-bit architectures is limited by the number of bits available for address randomization. In particular, we demonstrate a derandomization attack that will convert any standard buffer-overflow exploit into an exploit that works against systems protected by address-space randomization. The resulting exploit is as effective as the original, albeit somewhat slower: on average 216 seconds to compromise Apache running on a Linux PaX ASLR system. The attack does not require running code on the stack. We also explore various ways of strengthening address-space randomization and point out weaknesses in each. Surprisingly, increasing the frequency of re-randomizations adds at most 1 bit of security. Furthermore, compile-time randomization appears to be more effective than runtime randomization. We conclude that, on 32-bit architectures, the only benefit of PaX-like address-space randomization is a small slowdown in worm propagation speed. The cost of randomization is extra complexity in system support.
机译:地址空间随机化是一种用于强化系统免受缓冲区溢出攻击的技术。该想法是通过随机化某些系统组件的存储器位置来引入人工多样性。这种机制适用于Linux(通过PAX ASLR)和OpenBSD。我们研究了地址空间随机化的有效性,并发现其在32位架构上的实用性受到可用于随机化可用的比特数的限制。特别是,我们展示了一种嘲弄攻击,它将将任何标准缓冲区溢出的攻击转换为攻击,该漏洞利用由地址空间随机化保护的系统工作。由此产生的漏洞利用与原始有效,虽然略微慢:平均为216秒,妥协在Linux Pax ASLR系统上运行的Apache。攻击不需要在堆栈上运行代码。我们还探讨了各种加强地址空间随机化的方式,并指出每个人的弱点。令人惊讶的是,增加重新加速的频率最多增加了最多的安全性。此外,编译时间随机化似乎比运行时随机化更有效。我们得出结论,在32位架构上,PAX样地址空间随机化的唯一好处是蠕虫传播速度的小幅放缓。随机化成本在系统支持方面是额外的复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号