期刊文献+

Leakage Is Prohibited:Memory Protection Extensions Protected Address Space Randomization 被引量:2

Leakage Is Prohibited:Memory Protection Extensions Protected Address Space Randomization
原文传递
导出
摘要 Code reuse attacks pose a severe threat to modern applications. These attacks reuse existing code segments of vulnerable applications as attack payloads and hijack the control flow of a victim application. With high code entropy and a relatively low performance overhead, Address Space Layout Randomization(ASLR) has become the most widely explored defense against code reuse attacks. However, a single memory disclosure vulnerability is able to compromise this defense. In this paper, we present Memory Protection Extensions(MPX)-assisted Address Space Layout Randomization(M-ASLR), a novel code-space randomization scheme. M-ASLR uses several characteristics of Intel MPX to restrict code pointers in memory. We have developed a fully functioning prototype of M-ALSR, and our evaluation results show that M-ASLR:(1) offers no interference with normal operation;(2) protects against buffer overflow attacks, code reuse attacks, and other sophisticated modern attacks;and(3) adds a very low performance overhead(3.3%) to C/C++ applications. Code reuse attacks pose a severe threat to modern applications. These attacks reuse existing code segments of vulnerable applications as attack payloads and hijack the control flow of a victim application. With high code entropy and a relatively low performance overhead, Address Space Layout Randomization(ASLR) has become the most widely explored defense against code reuse attacks. However, a single memory disclosure vulnerability is able to compromise this defense. In this paper, we present Memory Protection Extensions(MPX)-assisted Address Space Layout Randomization(M-ASLR), a novel code-space randomization scheme. M-ASLR uses several characteristics of Intel MPX to restrict code pointers in memory. We have developed a fully functioning prototype of M-ALSR, and our evaluation results show that M-ASLR:(1) offers no interference with normal operation;(2) protects against buffer overflow attacks, code reuse attacks, and other sophisticated modern attacks;and(3) adds a very low performance overhead(3.3%) to C/C++ applications.
作者 Fei Yan Kai Wang
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期546-556,共11页 清华大学学报(自然科学版(英文版)
基金 supported in part by the National Natural Science Foundation of China(No.61272452) the National Key Basic Research and Development(973)Program of China(No.2014CB340601) the Natural Science Foundation of Hubei Province(No.2017CFB663)
关键词 ADDRESS SPACE Layout RANDOMIZATION (ASLR) Intel Memory Protection EXTENSIONS (MPX) code REUSE attack Address Space Layout Randomization(ASLR) Intel Memory Protection Extensions(MPX) code reuse attack
  • 相关文献

同被引文献2

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部