首页> 外文会议>IEEE Security and Privacy Workshops >Identifying Valuable Pointers in Heap Data
【24h】

Identifying Valuable Pointers in Heap Data

机译:在堆数据中识别有价值的指针

获取原文

摘要

Historically, attackers have sought to manipulate programs through the corruption of return addresses, function pointers, and other control flow data. However, as protections like ASLR, stack canaries, and no-execute bits have made such attacks more difficult, data-oriented exploits have received increasing attention. Such exploits try to subvert a program by reading or writing non-control data, without introducing any foreign code or violating the program’s legitimate control flow graph. Recently, a data-oriented exploitation technique called memory cartography was introduced, in which an attacker navigates between allocated memory regions using a precompiled map to disclose sensitive program data. The efficacy of memory cartography is dependent on inter-region pointers being located at constant offsets within memory regions; thus, cartographic attacks are difficult to launch against memory regions like heaps and stacks that have nondeterministic layouts. In this paper, we lower the barrier to successful attacks against nondeterministic memory, demonstrating that pointers between regions of memory often possess unique “signatures” that allow attackers to identify them with high accuracy. These signatures are accurate even when the pointers reside in non-deterministic memory areas. In many real-world programs, this allows an attacker that is capable of reading bytes from a single heap to access all of process memory. Our findings underscore the importance of memory isolation via separate address spaces.
机译:从历史上看,攻击者试图通过返回地址,函数指针和其他控制流数据的损坏来操纵程序。然而,由于像Aslr,堆栈大公和无执行位这样的保护,因为更加困难的攻击,有导向的数据的漏洞已经收到了不断的关注。这种漏洞试图通过读取或写入非控制数据来颠覆程序,而不会引入任何外部代码或违反程序的合法控制流程图。近来,引入了一种称为内存制图的数据导向的开发技术,其中攻击者使用预编译的地图在分配的存储区之间导航,以揭示敏感节目数据。记忆制备的功效取决于区域间指针位于内存区域内的恒定偏移处;因此,制图攻击难以启动对堆积的内存区域和具有非近期布局的堆栈。在本文中,我们将屏障降低了对非叛徒记忆的成功攻击,展示了内存区域之间的指针通常具有独特的“签名”,允许攻击者以高精度识别它们。即使指针驻留在非确定性内存区域中,这些签名也准确。在许多真实的程序中,这允许一个能够从单个堆中读取字节来访问所有过程内存的攻击者。我们的调查结果强调了通过单独的地址空间的内存隔离的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号