期刊文献+

基于ARMv8架构gadget自动搜索框架 被引量:3

AN AUTOMATED GADGET SEARCH FRAMEWORK BASED ON ARMv8 ARCHITECTURE
下载PDF
导出
摘要 为了在ARM公司最新发布的首款支持64位处理器的ARMv8架构上实现ROP(Return_Oriented Programmig)技术,设计了ARMv8架构上的ROP gadget的自动搜索工具。通过结合ARMv8架构指令系统的特点,首先在库文件搜索出所有的以RET指令结尾的短指令序列,并把这些指令序列存储在gadget库中,然后采用一些优化策略对该库进行优化,最后根据用户的输入在库中搜索到与用户输入功能相同的gadget链。通过对搜索工具搜索到的gadget的统计,结果表明gadget集具有图灵完整性,可以执行任意的操作。最后通过一个实例证明了ROP在ARMv8架构上的可行性。 To implement ROP( return-oriented programming) technology on the first ARMv8 architecture supporting 64 bits processor which is the latest release of ARM,we designed an automatic search tool for ROP gadget on ARMv8 architecture. By combining the features of instruction system of ARMv8 architecture,it first searches all the short instruction sequences ending with "RET"instruction in library files,and stores these instruction sequences to gadget library,and then uses some optimisation strategy to optimise the library,finally,according to users' input it finds the gadget chains with same function of users' input. Through the statistics of gadgets searched by search tool,result showed that the gadget set had the Turing completeness,and could execute any operation. In end of the paper,through an example we proved the feasibility of ROP on ARMv8 architecture.
出处 《计算机应用与软件》 CSCD 2016年第5期307-311,316,共6页 Computer Applications and Software
基金 国家高技术研究发展计划基金项目(2009AA012200)
关键词 ROP 指令序列 自动搜索 ARMv8 图灵完整性 ROP Instruction sequence Automatic search ARMv8 Turing completeness
  • 相关文献

参考文献12

  • 1Krahmer S.x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique[J].C1:Vulnerable Server application,2005.
  • 2Shacham H.The geometry of innocent flesh on the bone:Return-intolibc without function calls(on the x86)[C]//Proceedings of the 14th ACM conference on Computer and communications security.ACM,2007:552-561.
  • 3Kornau T.Return oriented programming for the ARM architecture[D].Master’s thesis,Ruhr-Universitat Bochum,2010.
  • 4Roemer R,Buchanan E,Shacham H,et al.Return-oriented programming:Systems,languages,and applications[J].ACM Transactions on Information and System Security(TISSEC),2012,15(1):2.
  • 5Vincenzo Iozzo,ROP and i Phone.http://blog.zynamics.com/2010/04/16/rop-and-iphone/,Apri,16,2010.
  • 6Schwartz E J,Avgerinos T,Brumley D.Q:Exploit Hardening Made Easy[C]//USENIX Security Symposium,2011.
  • 7Chen P,Xiao H,Shen X B,et al.DROP:Detecting return-oriented programming malicious code[M]//Information Systems Security.Springer Berlin Heidelberg,2009:163-177.
  • 8Yang C,Zheng T,Lin Z.AR Exploit:An Automatic ROP Exploit Based on Long Sequence[C]//Software Security and Reliability-Companion(SERE-C),2014 IEEE Eighth International Conference on.IEEE,2014:50-56.
  • 9https://silver.arm.com/download/ARM_and_AMBA_Architecture/AR100-DA-70501-r0p0-00eac5/ARMv8_ISA_PRD03-GENC-010197-30-0.pdf.
  • 10https://silver.arm.com/download/ARM_and_AMBA_Architecture/AR10 0-DA-70501-r0p0-00eac5/DDI0487A_a_armv8_arm_errata.pdf.

同被引文献24

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部