• ثبت نام
    • ورود به سامانه
    مشاهده مورد 
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 9, Issue 1
    • مشاهده مورد
    •   صفحهٔ اصلی
    • نشریات انگلیسی
    • The ISC International Journal of Information Security
    • Volume 9, Issue 1
    • مشاهده مورد
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Dwarf Frankenstein is still in your memory: tiny code reuse attacks

    (ندگان)پدیدآور
    Sadeghi, A.AAminmansour, F.Shahriari, H.R.
    Thumbnail
    دریافت مدرک مشاهده
    FullText
    اندازه فایل: 
    5.625 مگابایت
    نوع فايل (MIME): 
    PDF
    نوع مدرک
    Text
    ORIGINAL RESEARCH PAPER
    زبان مدرک
    English
    نمایش کامل رکورد
    چکیده
    Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common behaviour of code reuse attacks, which is the construction of a gadget chain. Therefore, the implication of a gadget and the minimum size of an attack chain are a matter of controversy. Conservative or relaxed thresholds may cause false positive and false negative alarms, respectively. The main contribution of this paper is to provide a tricky aspect of code reuse techniques, called tiny code reuse attacks (Tiny-CRA) that demonstrates the ineffectiveness of the threshold based detection methods. We show that with bare minimum assumptions, Tiny-CRA can reduce the size of a gadget chain in shuch a way that no distinction can be detected between normal behavior of a program and a code-reuse execution. To do so, we exhibit our Tiny-CRA primitives and introduce a useful gadget set available in libc. We demonstrate the effectiveness of our approach by implementing nine different shell-codes and exploiting real-world buffer overflow vulnerability in HT Editor 2.0.20.
    کلید واژگان
    Software Security
    Code Reuse Attacks
    Jump Oriented Programming
    Tiny JOP
    Kernel Trapper Gadget

    شماره نشریه
    1
    تاریخ نشر
    2017-01-01
    1395-10-12
    ناشر
    Iranian Society of Cryptology
    سازمان پدید آورنده
    Amirkabir University of Technology
    Amirkabir University of Technology (Tehran Polytechnic)
    Amirkabir University of Technology- Tehran

    شاپا
    2008-2045
    2008-3076
    URI
    https://dx.doi.org/10.22042/isecure.2017.0.0.4
    http://www.isecure-journal.com/article_43782.html
    https://iranjournals.nlai.ir/handle/123456789/73328

    مرور

    همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

    حساب من

    ورود به سامانهثبت نام

    آمار

    مشاهده آمار استفاده

    تازه ترین ها

    تازه ترین مدارک
    © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
    تماس با ما | ارسال بازخورد
    قدرت یافته توسطسیناوب