2018
DOI: 10.1007/978-3-319-93411-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Bytecode Corruption Attacks Are Real—And How to Defend Against Them

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…These script interpreters prevent internally the usage of specific sensitive functions from being executed. However, Park et al [28] presented an attack with a restricted attacker model that is able to rewrite bytecode of functions to execute these sensitive functions and therefore bypassing the restriction. By applying our approach for an application-specific script interpreter, these restricted functionalities are completely removed from the interpreter and hence such an attack cannot use them.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…These script interpreters prevent internally the usage of specific sensitive functions from being executed. However, Park et al [28] presented an attack with a restricted attacker model that is able to rewrite bytecode of functions to execute these sensitive functions and therefore bypassing the restriction. By applying our approach for an application-specific script interpreter, these restricted functionalities are completely removed from the interpreter and hence such an attack cannot use them.…”
Section: Discussionmentioning
confidence: 99%
“…Normally, unwanted functionalities are disabled in configuration files. However, since the code that provides these functionalities is still available in the script interpreter, an attacker might be able to bypass the restrictions and escape the interpreter's internal sandbox [28]. When compiling the script interpreter in an application-specific way, the code for the unneeded functionalities are completely removed, which prevents an attacker from using them entirely.…”
Section: Introductionmentioning
confidence: 99%
“…As another example, Frassetto et al describe how a memory corruption vulnerability can be used to modify the byte code of an interpreted program such that subsequent JIT compilation results in the creation of the malicious payload [15]. As these examples suggest, vulnerabilities arising from dynamic code generation pose a significant security challenge [33,40]. To deal with such situations, it would be helpful to be able to start from some appropriate point in the dynamically generated code-e.g., an instruction that crashes as a result of the bug, or is part of the exploit code-and trace dependencies back, into and through the JIT compiler's code, to help identify the bug that caused incorrect code to be generated or the byte code to be corrupted.…”
Section: Introductionmentioning
confidence: 99%
“…execute arbitrary system calls, all while bypassing code-reuse defenses such as CFI [14,20,22,26,27,38].…”
mentioning
confidence: 99%