...
首页> 外文期刊>The Journal of Systems and Software >deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
【24h】

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level

机译:deExploit:识别输入数据的滥用以诊断二进制级别的内存损坏漏洞

获取原文
获取原文并翻译 | 示例

摘要

Memory-corruption exploits are one of the major threats to the Internet security. Once an exploit has been detected, exploit diagnosis techniques can be used to identify the unknown vulnerability and attack vector. In the security landscape, exploit diagnosis is always performed by third-party security experts who cannot access the source code. This makes binary-level exploit diagnosis a time-consuming and error-prone process. Despite considerable efforts to defend against exploits, automatic exploit diagnosis remains a significant challenge. In this paper, we propose a novel insight for detecting memory corruption at the binary level by identifying the misuses of input data and present an exploit diagnosis approach called deExploit. Our approach requires no knowledge of the source code or debugging information. For exploit diagnosis, deExploit is generic in terms of the detection of both control-flow-hijack and data-oriented exploits. In addition, deExploit automatically provides precise information regarding the corruption point, the memory operation that causes the corruption, and the key attack steps used to bypass existing defense mechanisms. We implement deExploit and perform it to diagnose multiple realistic exploits. The results show that deExploit is able to diagnose memory-corruption exploits.
机译:内存损坏漏洞利用是对Internet安全的主要威胁之一。一旦检测到漏洞,就可以使用漏洞诊断技术来识别未知漏洞和攻击媒介。在安全领域,漏洞诊断始终由无法访问源代码的第三方安全专家执行。这使得二进制级别的漏洞利用诊断成为一个耗时且容易出错的过程。尽管为防御漏洞做出了巨大努力,但自动漏洞诊断仍然是一项重大挑战。在本文中,我们提出了一种新颖的见解,可以通过识别输入数据的滥用来检测二进制级别的内存损坏,并提出一种称为deExploit的漏洞利用诊断方法。我们的方法不需要任何源代码或调试信息。对于漏洞利用诊断,就检测控制流劫持和面向数据的漏洞而言,deExploit是通用的。此外,deExploit自动提供有关损坏点,导致损坏的内存操作以及用于绕过现有防御机制的关键攻击步骤的精确信息。我们实施deExploit并执行它以诊断多个实际漏洞。结果表明,deExploit能够诊断内存损坏漏洞。

著录项

  • 来源
    《The Journal of Systems and Software 》 |2017年第2期| 153-168| 共16页
  • 作者单位

    Stake Key Laboratory of Software Engineering, Wuhan University, 430072, China,Key Laboratory of Aerospace Information Security and Trust Computing, Wuhan University, 430072, China,School of Computer, Wuhan University, 430072, China;

    Changjiang River Scientific Research Institute, Wuhan, 430010, China;

    Stake Key Laboratory of Software Engineering, Wuhan University, 430072, China,Key Laboratory of Aerospace Information Security and Trust Computing, Wuhan University, 430072, China,School of Computer, Wuhan University, 430072, China;

    APL Software, CA, 94043, USA;

    Stake Key Laboratory of Software Engineering, Wuhan University, 430072, China,Key Laboratory of Aerospace Information Security and Trust Computing, Wuhan University, 430072, China,School of Computer, Wuhan University, 430072, China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Software vulnerability; Exploit diagnosis; Memory corruption; Reverse engineering;

    机译:软件漏洞;利用诊断内存损坏;逆向工程;

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号