DocumentCode :
3508673
Title :
A key-agreement protocol based on the stack-overflow software vulnerability
Author :
Fatayer, Tamer S. ; Khattab, Sherif ; Omara, Fatma A.
Author_Institution :
Dept. of Comput. Sci., Alaqsa Univ., Palestinian Authority
fYear :
2010
fDate :
22-25 June 2010
Firstpage :
411
Lastpage :
416
Abstract :
Exploiting software vulnerabilities, such as stack overflow, heap overflow, and format string exploits, enables attackers to break into victim machines. Moreover, attackers tend to use obfuscation techniques, such as encryption, to evade intrusion detection systems. In this paper, we show that a common stack-overflow attack, namely the return-to-libc attack, coupled with a common defense, namely the Address Space Layout Randomization (ASLR), together allow for constructing a key-agreement protocol that allows two entities (e.g., a Trojan and a controller) to agree on a shared key, whereas the shared key can then be used to encrypt further communication. We have developed a prototype of our key-agreement protocol to evaluate its feasibility and performance. Our results show that both time and message overhead of our protocol are linear in key length. Although our key-agreement protocol can be used by attackers for malicious purposes, it has low computation overhead, making it a candidate for adoption in CPU-constrained platforms.
Keywords :
Layout; Linux; Operating systems; Protocols; Servers; Trojan horses; Software security; key agreement; memory randomization; return-to-libc attack; stack overflow;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications (ISCC), 2010 IEEE Symposium on
Conference_Location :
Riccione, Italy
ISSN :
1530-1346
Print_ISBN :
978-1-4244-7754-8
Type :
conf
DOI :
10.1109/ISCC.2010.5546530
Filename :
5546530
Link To Document :
بازگشت