Function risk assessment under memory leakage

Code reuse attack (CRA), specifically reusing and then reconstructing the codes (gadgets) already existed in programs and libraries, is widely exploited in software attacks. Admittedly, determination of the location of the gadgets consisted of target instructions along with control flow transfer ins...

Full description

Saved in:
Bibliographic Details
Main Authors: FU, Jianming, JIN, Rui, LIN, Yan, JIANG, Baihe, GUO, Zhengwei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4393
https://ink.library.smu.edu.sg/context/sis_research/article/5396/viewcontent/Function_risk_assessment_under_memory_leakage_2018_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5396
record_format dspace
spelling sg-smu-ink.sis_research-53962020-12-07T07:33:25Z Function risk assessment under memory leakage FU, Jianming JIN, Rui LIN, Yan JIANG, Baihe GUO, Zhengwei Code reuse attack (CRA), specifically reusing and then reconstructing the codes (gadgets) already existed in programs and libraries, is widely exploited in software attacks. Admittedly, determination of the location of the gadgets consisted of target instructions along with control flow transfer instructions, is of critical importance. Address Space Randomization (ASR), which serves as an effective technique to mitigate CRA, increases the entropy by randomizing the location of the code or data, and baffles adversaries from figuring out the memory layout. Currently, variable randomization methods of high granularity are proposed by scholars to prevent adversaries from deducting memory layout. However, their credibility on alleviating CRA is yet to be confirmed, especially when the suitable pointer is exposed to adversaries. In this paper, we focus on studying what kinds of function leakage can lead to a CRA more likely. A function risk assessment model focusing on function coupling is proposed to quantify the risk caused by the suitable function pointer leakage and it is extended to assess the risk of the whole program and library under the memory leakage. Our experimental results show that popular open-source software is vulnerable when certain code pointer is leaked to adversaries and even severer when the system library is accessible. In addition, suggestions to eliminate function coupling and evaluate the availability of randomization methods are further discussed. 2018-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4393 info:doi/10.1109/NANA.2018.8648754 https://ink.library.smu.edu.sg/context/sis_research/article/5396/viewcontent/Function_risk_assessment_under_memory_leakage_2018_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Code Reuse Attack Memory Leakage Randomization Risk Assessment Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Code Reuse Attack
Memory Leakage
Randomization
Risk Assessment
Information Security
Software Engineering
spellingShingle Code Reuse Attack
Memory Leakage
Randomization
Risk Assessment
Information Security
Software Engineering
FU, Jianming
JIN, Rui
LIN, Yan
JIANG, Baihe
GUO, Zhengwei
Function risk assessment under memory leakage
description Code reuse attack (CRA), specifically reusing and then reconstructing the codes (gadgets) already existed in programs and libraries, is widely exploited in software attacks. Admittedly, determination of the location of the gadgets consisted of target instructions along with control flow transfer instructions, is of critical importance. Address Space Randomization (ASR), which serves as an effective technique to mitigate CRA, increases the entropy by randomizing the location of the code or data, and baffles adversaries from figuring out the memory layout. Currently, variable randomization methods of high granularity are proposed by scholars to prevent adversaries from deducting memory layout. However, their credibility on alleviating CRA is yet to be confirmed, especially when the suitable pointer is exposed to adversaries. In this paper, we focus on studying what kinds of function leakage can lead to a CRA more likely. A function risk assessment model focusing on function coupling is proposed to quantify the risk caused by the suitable function pointer leakage and it is extended to assess the risk of the whole program and library under the memory leakage. Our experimental results show that popular open-source software is vulnerable when certain code pointer is leaked to adversaries and even severer when the system library is accessible. In addition, suggestions to eliminate function coupling and evaluate the availability of randomization methods are further discussed.
format text
author FU, Jianming
JIN, Rui
LIN, Yan
JIANG, Baihe
GUO, Zhengwei
author_facet FU, Jianming
JIN, Rui
LIN, Yan
JIANG, Baihe
GUO, Zhengwei
author_sort FU, Jianming
title Function risk assessment under memory leakage
title_short Function risk assessment under memory leakage
title_full Function risk assessment under memory leakage
title_fullStr Function risk assessment under memory leakage
title_full_unstemmed Function risk assessment under memory leakage
title_sort function risk assessment under memory leakage
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/4393
https://ink.library.smu.edu.sg/context/sis_research/article/5396/viewcontent/Function_risk_assessment_under_memory_leakage_2018_av.pdf
_version_ 1770574695949664256