Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23209
|View full text |Cite
|
Sign up to set email alerts
|

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines

Abstract: Return-oriented programming (ROP) has become the dominant form of vulnerability exploitation in both user and kernel space. Many defenses against ROP exploits exist, which can significantly raise the bar against attackers. Although protecting existing code, such as applications and the kernel, might be possible, taking countermeasures against dynamic code, i.e., code that is generated only at run-time, is much harder. Attackers have already started exploiting Just-in-Time (JIT) engines, available in all modern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
28
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(32 citation statements)
references
References 26 publications
1
28
0
Order By: Relevance
“…Given that modern systems are protected by DEP, attackers cannot overwrite read-only code to forge virtual functions with correct signatures. Thus this layer of defense is practical and useful in the real world, because (1) most applications do not have writable code, and (2) forging signatures in writable code is hard due to defenses like ASLR and JIT spraying [31] mitigations. We strongly recommend deploying this defense in practice.…”
Section: Introductionmentioning
confidence: 99%
“…Given that modern systems are protected by DEP, attackers cannot overwrite read-only code to forge virtual functions with correct signatures. Thus this layer of defense is practical and useful in the real world, because (1) most applications do not have writable code, and (2) forging signatures in writable code is hard due to defenses like ASLR and JIT spraying [31] mitigations. We strongly recommend deploying this defense in practice.…”
Section: Introductionmentioning
confidence: 99%
“…The source code contains five constants. These constants are the gadgets required for calling mprotect [17]. The JITed contains these constants, and hence these constants can be exposed by an attacker.…”
Section: Examplementioning
confidence: 99%
“…For n = 16, the probability is 7.7 × 10 −19 . We chose two attacks presented in [17] for evaluating the security provided by libmask. One JavaScript attack is shown in Figure 6.…”
Section: E Security Evaluationmentioning
confidence: 99%
See 2 more Smart Citations