2011
DOI: 10.1007/s11633-011-0606-0
|View full text |Cite
|
Sign up to set email alerts
|

Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems

Abstract: Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1−3] , and so other mechanisms, such as stack guards and prelinking, have been introduced. In this paper, we show that host-based protection still does not offer a complete solution. To demonstrate the protection inadequacies, we perform an over the network brute force return-to-libc attack against a pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…We propose extending this to restrict all execution out of RAM regardless of the safety level of the corresponding application. While this does not prevent all stack based attacks as is the case with a return-to-libc attack [14], it does raise the difficulty level for mounting attacks on embedded systems. An attacker who attempts to violate this rule will immediately cause a CPU exception which can reset the system to restore it to a known secure state.…”
Section: Ram Execution Preventionmentioning
confidence: 99%
“…We propose extending this to restrict all execution out of RAM regardless of the safety level of the corresponding application. While this does not prevent all stack based attacks as is the case with a return-to-libc attack [14], it does raise the difficulty level for mounting attacks on embedded systems. An attacker who attempts to violate this rule will immediately cause a CPU exception which can reset the system to restore it to a known secure state.…”
Section: Ram Execution Preventionmentioning
confidence: 99%
“…In this paper, ASLR refers to randomizing the start address of dynamically linked library, which usually means randomization of default settings. Currently, modern operating systems use W⊕X and ASLR together to prevent control-flow hijacking [20]. This is also two system protections that are mainly bypassed in this paper.…”
Section: B W⊕x and Aslrmentioning
confidence: 99%
“…The increasing popularity of cloud computing combined with the limitations of traditional host based protection systems have added to the popularity of NIDS implementation [1]. The most common method of NIDS operation is signature based, in which packets are examined for patterns which are associated with, or known to be hazardous.…”
Section: Introductionmentioning
confidence: 99%