首页> 外文会议>International Conference on Big Data Analysis and Computer Science >An Automatic Evaluation Approach for Binary Software Vulnerabilities with Address Space Layout Randomization Enabled
【24h】

An Automatic Evaluation Approach for Binary Software Vulnerabilities with Address Space Layout Randomization Enabled

机译:具有地址空间布局随机化的二进制软件漏洞的自动评估方法

获取原文

摘要

ASLR is currently an effective mean to defend against exploits based on known addresses, but in recent years, exploit codes have begun to effectively bypass the ASLR technology. Since the ASLR mechanism bypass methods are different and closely related to the target program, the current vulnerability assessments with ASLR enabled are manually completed based on the experience of manual vulnerability exploitation. Therefore, how to quickly assess software vulnerabilities, especially with the ASLR enabled, is a problem that needs to be solved in current software security. In this paper, we propose an automatic evaluation approach for binary software vulnerabilities with ASLR enabled, that can obtain key address information from the program to identify the possible ASLR bypasspaths. The approach uses an information leakage method based on a recessive output function by imitating the ASLR bypass technology commonly used among human vulnerability exploitation experts. By inputting a valid proof of concept, it first obtains the vulnerability triggering constraints of the target program, then searches for the hidden output function to leak information, and generates a final exploit that can be used to bypass ASLR. We argue that this automatic evaluation approach can reduce the reliance on manual work of ASLR-related exploits, and improves the vulnerability assessment mechanism significantly. We evaluated our approach against three CTF binary programs, and the results show that it can assess the exploitability of the vulnerability with the ASLR enabled in seconds.
机译:ASLR目前是​​基于已知地址抵御利用的有效意义,但近年来,利用代码已经开始有效地绕过ASLR技术。由于ASLR机制旁路方法与目标程序不同,密切相关,因此根据手动漏洞利用的体验手动完成具有ASLR的当前漏洞评估。因此,如何快速评估软件漏洞,尤其是启用ASLR,是在当前软件安全性中解决的问题。在本文中,我们提出了一种与ASLR启用的二进制软件漏洞的自动评估方法,可以从程序中获取来自程序的关键地址信息,以识别可能的ASLR绕过路径。该方法采用基于隐性输出功能的信息泄漏方法,模仿常用于人类漏洞开发专家的ASLR旁路技术。通过输入有效的概念证明,它首先获得目标程序的漏洞触发约束,然后搜索隐藏的输出函数以泄漏信息,并生成可用于绕过ASLR的最终漏洞。我们认为,这种自动评估方法可以减少对与ASLR相关利用的手工工作的依赖,并显着提高漏洞评估机制。我们评估了我们对三个CTF二进制程序的方法,结果表明它可以评估漏洞的可利用性,在几秒钟内启用了ASLR。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号