首页> 外文期刊>International Journal of Applied Engineering Research >Analysis of ROP Attack on Grsecurity/PaX Linux Kernel Security Variables
【24h】

Analysis of ROP Attack on Grsecurity/PaX Linux Kernel Security Variables

机译:GRSECURITY / PAX Linux内核安全变量对ROP攻击分析

获取原文
获取原文并翻译 | 示例
           

摘要

The kernel and memory exploitation is highly destructive, and able to take control over one's system in result. Grsecurity/PaX module restrict application that exploit other processes, services or other users' id application introducing prevention method such as Writable XOR Executable (W {direct+}X). However, some modern attacks under code-reuse attack like Return-oriented Programming (ROP) may bypass this defense line easily. In this project, the Grsecurity/PaX compiled Linux kernel, will be tested by building a vulnerable program as sample for demonstration purpose, and constructing an exploit to test this environment. The sample vulnerable program is written in C programming language, whereas Python programming language will be used to construct the attacking script or as direct shell execution purpose, and Perl programming language will be merely used as direct shell execution purpose only. In short, return-oriented programming (ROP) or ROP without return, methods will be mainly used in constructing attack. From the experiment conducted, the combination of those methods is possible to bypass traditional protection like Writable XOR Execution (W {direct+} X) in 32 bits or Never eXecute (NX) in 64 bits. We propose a mitigation technique that can prevent large surface of kernel and memory attacks by killing the common path that taken by ROP attack at very early stage, by using just a few bytes of inline assembly code in C language, to have low performance impact and effective measure.
机译:内核和内存剥削是高度破坏性的,并且能够控制一个人的系统。 Grsecurity / Pax模块限制应用程序,该应用程序利用其他进程,服务或其他用户ID应用程序引入预防方法,例如可写的XOR可执行文件(W {Direct +} x)。但是,在代码重用攻击下的一些现代攻击,如以返回以换返回的编程(ROP)可以轻松绕过这种防御线。在该项目中,Grsecurity / PAX编译的Linux内核将通过构建易受攻击的程序作为示范目的的示例进行测试,并构建用于测试此环境的利用。示例易受攻击程序是用C编程语言编写的,而Python编程语言将用于构建攻击脚本或直接shell执行目的,而Perl编程语言仅将仅用为Direct Shell执行目的。简而言之,无返回的以返回返回的编程(ROP)或ROP,方法主要用于构建攻击。从进行的实验中,这些方法的组合可以绕过传统保护,如32位中的可写XOR执行(W {Direct +} x),也可以在64位中执行(nx)。我们提出了一种缓解技术,可以通过在早期阶段杀死ROP攻击的常见路径来防止核心和内存攻击的大量表面,通过使用C语言中的几个字节的内联汇编代码,具有低性能影响和有效措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号