2018 IEEE European Symposium on Security and Privacy (EuroS&P) 2018
DOI: 10.1109/eurosp.2018.00024
|View full text |Cite
|
Sign up to set email alerts
|

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Abstract: Address-space layout randomization is a wellestablished defense against code-reuse attacks. However, it can be completely bypassed by just-in-time code-reuse attacks that rely on information disclosure of code addresses via memory or side-channel exposure. To address this fundamental weakness, much recent research has focused on detecting and mitigating information disclosure. The assumption being that if we perfect such techniques, we will not only maintain layout secrecy but also stop code reuse. In this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 36 publications
(36 citation statements)
references
References 74 publications
0
36
0
Order By: Relevance
“…However, without such primitives, the attack surface for common systems software is believed to be limited. PIROP [36] shows position-independent codereuse attacks are still possible with at least massaging primitives, but only against basic ASLR. In contrast, BlindSide can operate in absence of information disclosure primitives and blindly craft such primitives despite fine-grained, leakage-resistant randomization.…”
Section: Related Workmentioning
confidence: 99%
“…However, without such primitives, the attack surface for common systems software is believed to be limited. PIROP [36] shows position-independent codereuse attacks are still possible with at least massaging primitives, but only against basic ASLR. In contrast, BlindSide can operate in absence of information disclosure primitives and blindly craft such primitives despite fine-grained, leakage-resistant randomization.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, in the case where an attack can be mounted without disclosing the text segment of the process (e.g., indirect JIT-ROP), any binary obfuscation technique can be used along with our ISR with strong encryption to provide sufficient protection. Such attacks require extensive knowledge of the victim application to succeed [32].…”
Section: Return Address Encryptionmentioning
confidence: 99%
“…We focus on hardening arbitrary code reuse defenses against information hiding attacks which have shown to trivially bypass even advanced defenses. We make no attempt to address other design weaknesses of such defenses, such as leakage-resistant code randomization being vulnerable to sophisticated code-reuse attacks [32,56,64].…”
Section: Securitymentioning
confidence: 99%