DocumentCode :
3659734
Title :
Evaluating the theoretical feasibility of an SROP attack against Oxymoron
Author :
Zubin Mithra; Vipin P.
Author_Institution :
CyberSecurity Systems And Networks, Amrita School Of Engineering, India
fYear :
2015
Firstpage :
1872
Lastpage :
1876
Abstract :
Many of the defenses proposed to defend against exploitation of memory corruption vulnerabilities rely on the randomization of addresses in the process space of a binary. Oxymoron is an exploit mitigation mechanism for x86 processors that relies on reorganizing the instructions in an Executable and Linkable Format(ELF) file to enable randomization at a page level. Sigreturn Oriented Programming(SROP) is an exploitation mechanism that requires very few gadgets. It has been shown that either these gadgets are available at constant addresses for a given kernel version or can be leaked. In this paper, we evaluate the theoretical feasibility of an SROP attack against an Oxymoron protected binary and determine the preconditions necessary to make such an attack possible. As an aid to writing such exploits, we also implement libsrop, a library that generates customizable SROP payloads for x86 and x86-64.
Keywords :
"Registers","Kernel","Linux","Libraries","Payloads","Servers","Ground penetrating radar"
Publisher :
ieee
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on
Print_ISBN :
978-1-4799-8790-0
Type :
conf
DOI :
10.1109/ICACCI.2015.7275891
Filename :
7275891
Link To Document :
بازگشت