期刊文献+

多模块ROP碎片化自动布局方法

Automatic fragmented layout for multi-module ROP
下载PDF
导出
摘要 返回导向式编程(Return Oriented Programming,ROP)是一种可有效绕过数据执行保护机制的技术。ROP通过搜索内存代码区中合适的汇编指令片段,可组成一段执行特定功能的程序。已有的ROP自动构造技术只考虑ROP链的功能实现,而忽视了ROP链布局对程序内存可控性的要求,导致自动生成的ROP链实用性低。为解决该问题,提出了一种基于符号执行的多模块ROP碎片化自动布局方法。该方法在ROP自动构造Q框架的基础上,以模块为单位对ROP链进行切片;使用符号执行工具S2E,对控制流劫持状态下的程序内存状态进行动态分析;为各ROP模块匹配相应的可控内存区域,构造碎片化布局的ROP链。实验证明,相比已有技术,该方法生成的ROP链有效降低了对程序内存可控性的要求。 ROP(return-oriented programming)is a technique which is able to bypass the protection of the DEP(data execution prevention).The ROP can constitute a program that performs a specific function by searching for an appropriate assembly instruction fragment in the memory code area.Previous methods for automatic generation of ROP do not consider the limitation of the layout of ROP caused by the program memory requirement,which leads to poor practicability of ROP.In order to solve this problem,a new method for automatic fragmented layout of multi-module ROP based on symbolic execution was proposed.The ROP chain was divided into different modules on the basis of automatic ROP generation framework Q;the controllability of memory was dynamically analyzed by using symbolic execution tool S2E;the controllable memory areas for each ROP module was found,and the fragmented layout ROP was automatically constructed.Experiments show that,compared with the previous methods,the ROP chain generated by the proposed method can effectively reduce the requirements for the program memory controllability.
作者 黄宁 黄曙光 潘祖烈 常超 HUANG Ning;HUANG Shuguang;PAN Zulie;CHANG Chao(College of Electronic Engineering, National University of Defense Technology, Heifei 230000, China)
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2020年第3期22-29,共8页 Journal of National University of Defense Technology
基金 国家重点研发计划“网络空间安全”重点专项资助项目(2017YFB0802905)。
关键词 数据执行保护 返回导向式编程 符号执行 碎片化布局 data execution prevention return-oriented programming symbolic execution fragmented layout
  • 相关文献

参考文献7

二级参考文献90

  • 1王伟,邓辉宇,刘轶群.缓冲区溢出防护体系的构造[J].信息安全与通信保密,2006,28(8):105-108. 被引量:1
  • 2赵朋,艾丽蓉,管铭,邢雪峰.防御缓冲区溢出攻击的有效策略[J].信息安全与通信保密,2007,29(3):126-128. 被引量:1
  • 3Advanced heap spraying techniques [Z/OL]. (2010-02-07), https://www. owasp, org/images/0/01/OWASL_IL_2010_ Jan_-_Moshe_Ben_Abu_- Advanced Heapspray. pdf. 被引量:1
  • 4Blazakis D. Interpreter exploitation: Pointer inference and JIT Spraying [Z/OL]. (2010-10-11), http: //www. semantiscope, com/research/BHDC2010/BHDC-2010 Paper. pd{, 2010. 被引量:1
  • 5Ratanaworabhan P, Livshits B, Zorn B. Nozzle: A defense against heap-spraying code injection attacks [C]// Proceedings of the 18th USENIX Security Symposium. Montreal, Canada: USENIX Association, 2009. 被引量:1
  • 6Wahbe R, Lucco S, Anderson T E. Efficient software based fault isolation [J]. Operating System Review, 1993, 27(5) : 203-216. 被引量:1
  • 7Vahdat A, Ghormley D, Anderson T. Efficient, portable, and robust extension of operating system functionality. Technical Report UCB CS 94 842 [R]. Berkeley, USA: Computer Science Division, University of California Berkeley, 1994. 被引量:1
  • 8McCamant S, Morrisett G. Evaluating SFI for a CISC architecture [C]// Proceedings of the 15th USENIX Security Symposium. Vancouver, Canada: USENIX Association, 2006:209 - 224. 被引量:1
  • 9Castro M, Costa M, Martin J, et al. Fast byte-granularity software fault isolation [C]// Proceedings of 22^nd Symposium on Operating System Principles. Gallatin Gateway, USA: Association for Computing Machinery Press, 2009:45 -58. 被引量:1
  • 10Provos N. Improving host security with system call policies[C]// Proceedings of 12th USENIX Security Symposium. San Antonio, USA: USENIX Association, 2003. 被引量:1

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部