2016
DOI: 10.14569/ijacsa.2016.070463
|View full text |Cite
|
Sign up to set email alerts
|

Containing a Confused Deputy on x86: A Survey of Privilege Escalation Mitigation Techniques

Abstract: Abstract-The weak separation between user-and kernelspace in modern operating systems facilitates several forms of privilege escalation. This paper provides a survey of protection techniques, both cutting-edge and time-tested, used to prevent common privilege escalation attacks. The techniques are compared against each other in terms of their effectiveness, their performance impact, the complexity of their implementation, and their impact on diversification techniques such as ASLR. Overall the literature provi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Overhead PA KE CF DM NS NM NK PV DA SA Main Techniques CFI [3,[39][40][41][42] 1∼15% ✗ ✓/✗ ✓ ✗ ✓/✗ ✗ ✓/✗ ✓ ✓ ✓ Analyze and enforce control flow integrity DFI [4,10,52] 7∼103% ✗ ✓/✗ ✓/✗ ✓ ✓/✗ ✗ ✓/✗ ✓ ✓/✗ ✓ Analyze and enforce data flow integrity : No evaluation on performance, 3 : only interfaces are presented for semantic correction, 4 : These approaches do not detect attacks, 5 : Removes setuid related attacks with the cost of redesign of interfaces and software, 6 : Higher accuracy if source code is available. 7 : Linux capabilities can be used as OS policy configuration without modifying or involving software logic.…”
Section: Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Overhead PA KE CF DM NS NM NK PV DA SA Main Techniques CFI [3,[39][40][41][42] 1∼15% ✗ ✓/✗ ✓ ✗ ✓/✗ ✗ ✓/✗ ✓ ✓ ✓ Analyze and enforce control flow integrity DFI [4,10,52] 7∼103% ✗ ✓/✗ ✓/✗ ✓ ✓/✗ ✗ ✓/✗ ✓ ✓/✗ ✓ Analyze and enforce data flow integrity : No evaluation on performance, 3 : only interfaces are presented for semantic correction, 4 : These approaches do not detect attacks, 5 : Removes setuid related attacks with the cost of redesign of interfaces and software, 6 : Higher accuracy if source code is available. 7 : Linux capabilities can be used as OS policy configuration without modifying or involving software logic.…”
Section: Approachesmentioning
confidence: 99%
“…However, since privilege sensitive code is shared by the parent and its child process, the same code can be exploited by the parent process. More specifically, if the attacker can manipulate the control flow of the parent process, such privilege sensitive code can be abused to launch privilege escalation attacks [7,46]. Hence, many legacy programs using setuid calls have been an active target by many shell code [16], ROP attacks [34,47], and non-control data attacks [24,27].…”
Section: Introductionmentioning
confidence: 99%
“…The adversaries who run these attacks are usually highly organized and well-resourced. These attacks are usually stealthy, multi-step 1 and of heterogeneous nature for different purposes, from spearphishing 2 for initial access purpose, to vulnerabilities exploit for execution purpose 3 , to Hijack or Token manipulation for persistence and privilege escalation purpose 4 , to covert channel for exfiltration purpose 5 . These multi-stage attacks are usually described as cyber kill chain.…”
Section: Introductionmentioning
confidence: 99%
“…ey work in groups, using stealthy and multi-step attack techniques to achieve their goal [1]. ese technologies are of heterogeneous nature for different tactic purposes, from spearphishing attachment [2] or supply chain compromise [3] for initial access to vulnerabilities exploit for execution [4], to Hijack or Token manipulation for persistence and privilege escalation [5], to covert channel for exfiltration [6]. Different intrusion detection systems (IDS) have been invented to detect and mitigate these attacks, such as malware detection [7], spearphishing detection, and covert channel detection.…”
Section: Introductionmentioning
confidence: 99%