2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.14
|View full text |Cite
|
Sign up to set email alerts
|

Lobotomy: An Architecture for JIT Spraying Mitigation

Abstract: Abstract-JIT spraying has an assured spot in an attacker's toolkit for Web browser exploitation: With JIT spraying an attacker is able to circumvent even the most sophisticated defense strategies against code injection, including address space layout randomization (ASLR), data execution prevention (DEP) and stack canaries.In this paper, we present LOBOTOMY, an architecture for building injection-safe JIT engines. LOBOTOMY is secure by design: it separates compiler and executor of a JIT engine in different proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
(14 reference statements)
0
3
0
Order By: Relevance
“…disabled on program memory to prevent the exploitation of buffer overflows attacks. To overcome this issue, JITs typically provide an access to program memory exclusively with write or execute permissions [12,13,24]. In this work, we follow the same approach, but in addition the buffer of the polymorphic instance is protected so that only the legitimate SGPC can write into it.…”
Section: Management Of the Memory Access Permissions On Code Buffersmentioning
confidence: 99%
“…disabled on program memory to prevent the exploitation of buffer overflows attacks. To overcome this issue, JITs typically provide an access to program memory exclusively with write or execute permissions [12,13,24]. In this work, we follow the same approach, but in addition the buffer of the polymorphic instance is protected so that only the legitimate SGPC can write into it.…”
Section: Management Of the Memory Access Permissions On Code Buffersmentioning
confidence: 99%
“…Finally, Lobotomy [31] proposes mitigating JIT spraying attacks by applying the principle of least privilege to the Firefox JIT engine: by splitting the compiler and executor modules of the engine, to greatly reduce the amount of code that needs to access writable and executable pages. The main drawbacks of Lobotomy, with respect to our approach, are: 1) its overhead, which is higher than ours, and 2) the need to redesign the JIT engine of the protected process.…”
Section: B Jit Sprayingmentioning
confidence: 99%
“…However, introducing this separation into an existing language runtime requires invasive process rearchitecting as well as runtime overhead in the form of interprocess communication. Lobotomy [16] and SDCG [28] take opposite approaches and allow the untrusted process to handle the RW and RX mappings, respectively. Overhead for these dual mapping defenses is high.…”
Section: B Memory Protectionmentioning
confidence: 99%