Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/ACSAC.2009.16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Surgically Returning to Randomized lib(c)

Published: 07 December 2009 Publication History

Abstract

To strengthen systems against code injection attacks, the write or execute only policy (W + X) and address space layout randomization (ASLR) are typically used in combination. The former separates data and code, while the latter randomizes the layout of a process. In this paper we present a new attack to bypass W + X and ASLR. The state-of-the-art attack against this combination of protections is based on brute-force, while ours is based on the leakage of sensitive information about the memory layout of the process. Using our attack an attacker can exploit the majority of programs vulnerable to stack-based buffer overflows surgically, i.e., in a single attempt. We have estimated that our attack is feasible on 95.6% and 61.8% executables (of medium size) for Intel x86 and x86-64 architectures, respectively. We also analyze the effectiveness of other existing protections at preventing our attack. We conclude that position independent executables (PIE) are essential to complement ASLR and to prevent our attack. However, PIE requires recompilation, it is often not adopted even when supported, and it is not available on all ASLR-capable operating systems. To overcome these limitations, we propose a new protection that is as effective as PIE, does not require recompilation, and introduces only a minimal overhead.

Cited By

View all
  • (2022)Adelie: continuous address space layout re-randomization for Linux driversProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507779(483-498)Online publication date: 28-Feb-2022
  • (2020)A Generic Technique for Automatically Finding Defense-Aware Code Reuse AttacksProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417234(1789-1801)Online publication date: 30-Oct-2020
  • (2019)SafehiddenProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361424(1239-1256)Online publication date: 14-Aug-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
December 2009
492 pages
ISBN:9780769539195

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 December 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Adelie: continuous address space layout re-randomization for Linux driversProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507779(483-498)Online publication date: 28-Feb-2022
  • (2020)A Generic Technique for Automatically Finding Defense-Aware Code Reuse AttacksProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417234(1789-1801)Online publication date: 30-Oct-2020
  • (2019)SafehiddenProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361424(1239-1256)Online publication date: 14-Aug-2019
  • (2019)SSPFAInternational Journal of Information Security10.1007/s10207-018-00425-818:4(519-532)Online publication date: 1-Aug-2019
  • (2017)ReRanzACM SIGPLAN Notices10.1145/3140607.305075252:7(143-156)Online publication date: 8-Apr-2017
  • (2017)Strict Virtual Call Integrity Checking for C++ BinariesProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3052976(140-154)Online publication date: 2-Apr-2017
  • (2017)DRIVEProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3052975(728-742)Online publication date: 2-Apr-2017
  • (2017)ReRanzProceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments10.1145/3050748.3050752(143-156)Online publication date: 8-Apr-2017
  • (2016)Jump over ASLRThe 49th Annual IEEE/ACM International Symposium on Microarchitecture10.5555/3195638.3195686(1-13)Online publication date: 15-Oct-2016
  • (2016)ShufflerProceedings of the 12th USENIX conference on Operating Systems Design and Implementation10.5555/3026877.3026906(367-382)Online publication date: 2-Nov-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media