Method for analysis of code-reuse attacks
Autor: | A. V. Vishnyakov, A. R. Nurmukhametov, Sh. F. Kurmangaleev, S. S. Gaisaryan |
---|---|
Jazyk: | English<br />Russian |
Rok vydání: | 2018 |
Předmět: | |
Zdroj: | Труды Института системного программирования РАН, Vol 30, Iss 5, Pp 31-54 (2018) |
Druh dokumentu: | article |
ISSN: | 2079-8156 2220-6426 |
Popis: | Providing security for computer programs is one of the paramount tasks nowadays. Failures in operation of program software can lead to serious consequences and exploitation of vulnerabilities can inflict immense harm. Large corporations pay particular attention to the analysis of computer security incidents. Code-reuse attacks based on return-oriented programming are gaining more and more popularity each year and can bypass even modern operating system protections. Unlike common shellcode, where instructions are placed consequently in memory, ROP chain contains of several small instruction blocks (gadgets) and uses stack to chain them together, which makes analysis of ROP exploits more difficult. The main goal of this work is to simplify reverse engineering of ROP exploits. In this paper I propose the method for analysis of code-reuse attacks, which allows one to split chain into gadgets, restore the semantics of each particular gadget, and restore prototypes and parameters values of system calls and functions called during the execution of ROP chain. Parametrized types define gadget semantics. Each gadget type is defined by a postcondition (boolean predicate) that must always be true after executing the gadget. The proposed method was implemented as a program tool and tested on real ROP exploits found on the internet. |
Databáze: | Directory of Open Access Journals |
Externí odkaz: |