Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23262
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

Abstract: It is a well-known issue that attack primitives which exploit memory corruption vulnerabilities can abuse the ability of processes to automatically restart upon termination. For example, network services like FTP and HTTP servers are typically restarted in case a crash happens and this can be used to defeat Address Space Layout Randomization (ASLR). Furthermore, recently several techniques evolved that enable complete process memory scanning or code-reuse attacks against diversified and unknown binaries based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
48
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 49 publications
(49 citation statements)
references
References 21 publications
1
48
0
Order By: Relevance
“…Breaking "security by memory obscurity". DrK can also be applied to launch an undetectable, crash-resistant memory mapping probing [19]. Some system protection mechanisms, such as CPI [35], ASLR-Guard [39], and Kenali [54], assume a secret memory location that the attacker cannot know to store sensitive information for integrity protection.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Breaking "security by memory obscurity". DrK can also be applied to launch an undetectable, crash-resistant memory mapping probing [19]. Some system protection mechanisms, such as CPI [35], ASLR-Guard [39], and Kenali [54], assume a secret memory location that the attacker cannot know to store sensitive information for integrity protection.…”
Section: Discussionmentioning
confidence: 99%
“…Module detection. As mentioned in §4.2.3, DrK detected a larger number of drivers (97) than the prior attack (5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19)(20)(21). This is because DrK has better accuracy than the prior attack and DrK is able to use not only size signatures but also executable mapping status.…”
Section: Comparison With the Prior Attackmentioning
confidence: 96%
See 1 more Smart Citation
“…Although ASLR has a wider scope than these schemes (e.g., use-after-free bugs), it can only provide probabilistic safety at best, whereas Delta Pointers provide deterministic (spatial) memory safety guarantees on the upper bound. Because of its probabilistic nature, ASLR has proven to be easily circumventable by memory massaging [16,33] or side channels [5,15,17] whereas this is not possible for deterministic defenses such as Delta Pointers. Moreover, the impact of address space reduction is limited in certain application domains.…”
Section: Pointermentioning
confidence: 99%
“…However, recent runtime attacks [22,26,37] undermine the security property of dual stacks. Both SafeStack and AG-Stack rely on information hiding and conceal the location of their safe stacks by means of Address Space Layout Randomisation (ASLR).…”
Section: Introductionmentioning
confidence: 99%