首页> 外文会议>European symposium on research in computer security >Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
【24h】

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software

机译:在特权分隔软件中识别任意内存访问漏洞

获取原文

摘要

Privilege separation is a widely used technique to secure complex software systems. With privilege separation, software components are divided into several partitions and these partitions can only communicate through limited interfaces. However, the interfaces still provide a channel for one partition to influence code in other partitions. As a result, certain memory access patterns can be leveraged by attackers to perform arbitrary memory access. We refer to this type of memory access errors by the acronym DUI (Dereference Under the Influence). In this paper, we present a systematic method to detect vulnerabilities leading to DUI through binary analysis, and to estimate the capability attackers can obtain through DUI exploits. The evaluation shows that our approach can accurately identify vulnerable code that leads to arbitrary memory access in real-world software components and programs, when they are transformed to privilege-separated designs.
机译:特权分离是一种广泛使用的技术来保护复杂的软件系统。具有特权分离,软件组件分为多个分区,这些分区只能通过有限的接口进行通信。然而,接口仍然为一个分区提供一个分区的频道,以影响其他分区中的代码。结果,攻击者可以利用某些存储器访问模式来执行任意内存访问。我们通过首字母缩略词DUI(影响下的DEREIFED)引用这种类型的内存访问错误。在本文中,我们提出了一种通过二进制分析来检测导致DUI的漏洞的系统方法,并估计能力攻击者可以通过DUI利用获得。评估表明,我们的方法可以准确地识别易受攻击的代码,该代码导致现实世界软件组件和程序中的任意内存访问,当它们被转换为特权分隔的设计时。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号