首页> 外文会议>European Symposium on Research in Computer Security >Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets
【24h】

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets

机译:自动化CFI抗性代码小工具的多架构发现

获取原文

摘要

Memory corruption vulnerabilities are still a severe threat for software systems. To thwart the exploitation of such vulnerabilities, many different kinds of defenses have been proposed in the past. Most prominently, Control-Flow Integrity (CFI) has received a lot of attention recently. Several proposals were published that apply coarse-grained policies with a low performance overhead. However, their security remains questionable as recent attacks have shown. To ease the assessment of a given CFI implementation, we introduce a framework to discover code gadgets for code-reuse attacks that conform to coarse-grained CFI policies. For this purpose, binary code is extracted and transformed to a symbolic representation in an architecture-independent manner. Additionally, code gadgets are verified to provide the needed functionality for a security researcher. We show that our framework finds more CFI-compatible gadgets compared to other code gadget discovery tools. Furthermore, we demonstrate that code gadgets needed to bypass CFI solutions on the ARM architecture can be discovered by our framework as well.
机译:内存损坏漏洞仍然是软件系统的严重威胁。为了挫败这种漏洞的开发,过去已经提出了许多不同的防御。最突出的是,控制流程完整性(CFI)最近受到了很多关注。公布了几项提案,将粗大的政策应用于低性能开销。但是,由于最近攻击表明,他们的安全仍然是可疑的。为了简化对给定的CFI实现的评估,我们介绍了一个框架,以发现代码重用攻击的代码小工具,该攻击符合CFI策略的CFI策略。为此目的,以与架构 - 独立的方式提取二进制代码并转换为符号表示。此外,验证了代码小工具以提供安全研究员所需的功能。我们显示,与其他代码小工具发现工具相比,我们的框架查找了更多CFI兼容的小工具。此外,我们证明了我们的框架可以发现绕过ARM架构上的CFI解决方案所需的代码小工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号