Preventing exploits against memory corruption vulnerabilitiesReport as inadecuate


Preventing exploits against memory corruption vulnerabilities


Preventing exploits against memory corruption vulnerabilities - Download this document for free, or read online. Document in PDF available to download.

The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely have serious vulnerabilities. More alarmingly, even the trusted computing base e.g. OS kernel still contains vulnerabilities that would allow attackers to subvert security mechanisms such as the application sandbox on smartphones. Among all vulnerabilities, memory corruption is one of the most ancient, prevalent, and devastating vulnerabilities. This thesis proposed three projects on mitigating this threat. There are three popular ways to exploit a memory corruption vulnerability-attacking the code a.k.a. code injection attack, the control data a.k.a. control-flow hijacking attack, and the non-control data a.k.a. data-oriented attack. Theoretically, code injection attack can be prevented with the executable XOR writable policy; but in practice, this policy is undermined by another important technique-dynamic code generation e.g. JIT engines. In the first project, we first showed that this conflict is actually non-trivial to resolve, then we introduced a new design paradigm to fundamentally solve this problem, by relocating the dynamic code generator to a separate process. In the second project, we focused on preventing data-oriented attacks against operating system kernel. Using privilege escalation attacks as an example, we 1 demonstrated that data-oriented attacks are realistic threats and hard to prevent; 2 discussed two important challenges for preventing such attacks i.e., completeness and performance; and 3 presented a system that combines program analysis techniques and system designs to solve these challenges. During these two projects, we found that lacking sufficient hardware support imposes many unnecessary difficulties in building robust and efficient defense mechanisms. In the third project, we proposed HDFI hardware-assisted data-flow isolation to overcome this limitation. HDFI is a new fine-grained isolation mechanism that enforces isolation at the machine word granularity, by virtually extending each memory unit with an additional tag that is defined by data-flow. This capability allows HDFI to enforce a variety of security models such as the Biba Integrity Model and the Bell-LaPadula Model. For demonstration, we developed and ported several security mechanisms to leverage HDFI, including stack protection, standard library enhancement, virtual function table protection, code pointer protection, kernel data protection, and information leak prevention. The evaluation results showed that HDFI is easy to use, imposes low performance overhead, and allows us to create simpler and more secure solutions.



College of Computing Theses and Dissertations - Georgia Tech Theses and Dissertations -



Author: Song, Chengyu - -

Source: https://smartech.gatech.edu/







Related documents