2016
DOI: 10.1007/978-3-319-49151-6_25
|View full text |Cite
|
Sign up to set email alerts
|

ARMv8 Shellcodes from ‘A’ to ‘Z’

Abstract: We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered devices such as smartphones.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
(12 reference statements)
0
3
0
Order By: Relevance
“…Although this technique has allowed us to effectively bypass the aforementioned checks, we must observe that it reduces the number of machine instructions that can appear inside a malicious payload: besides a prologue composed of binary instructions, the rest of the payload is obviously limited to machine instructions that are also ASCII characters. It is important to note that the metamorphic and polymorphic transformations are independent of the ASCII encoding as shown in [7] where the authors describe a technique for turning an arbitrary ARMv8 code into alphanumeric (ASCII) executable code. The technique is generic and may well apply to other architectures.…”
Section: B Datasetmentioning
confidence: 99%
“…Although this technique has allowed us to effectively bypass the aforementioned checks, we must observe that it reduces the number of machine instructions that can appear inside a malicious payload: besides a prologue composed of binary instructions, the rest of the payload is obviously limited to machine instructions that are also ASCII characters. It is important to note that the metamorphic and polymorphic transformations are independent of the ASCII encoding as shown in [7] where the authors describe a technique for turning an arbitrary ARMv8 code into alphanumeric (ASCII) executable code. The technique is generic and may well apply to other architectures.…”
Section: B Datasetmentioning
confidence: 99%
“…The technique however does not carry over to more recent implementations. In 2016, Barral et al introduced the first tool capable of compiling arbitrary ARMv8 code into alphanumeric executable code [3]. This is a tour de force but also and most importantly it introduces a generic approach to design such tools.…”
Section: Prior and Related Workmentioning
confidence: 99%
“…Through a three-staged modular design, these shellcodes achieve arbitrary code execution on this platform. This is the second architecture which can be addressed using the methodology from [3], which is an argument in favor of such generic approaches (rather than ad hoc ones). Our approach differs on the fact that we do not manually assemble available instructions into higher-level constructs for building the unpacker in a bottom-up fashion and instead opt for a partially automated strategy to generate the required alphanumeric instruction sequences to achieve the desired results.…”
Section: Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation