Twisted-Stack : Stack randomization for mitigating (Just-in-time) return oriented programming스택 랜덤화를 통한 (실시간) 리턴 지향 프로그래밍 공격 완화

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 796
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKang, Brent Byunghoon-
dc.contributor.advisor강병훈-
dc.contributor.authorLee, Seongman-
dc.date.accessioned2018-06-20T06:25:03Z-
dc.date.available2018-06-20T06:25:03Z-
dc.date.issued2017-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675497&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/243498-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2017.2,[iv, 25 p. :]-
dc.description.abstractReturn-Oriented Programming (ROP) is considered a highly threatening exploit technique. For mitigating ROP attacks, many researchers have proposed fine-grained Address Space Layout Randomization (ASLR). And it is considered as an efficient defense mechanism for ROP attacks. However, new advanced ROP attack called the JIT-ROP circumvents the fine-grained ASLR by disassembling the code pages repeatedly in runtime. For Mitigating the JIT-ROP attack, many researchers have proposed leakage-resilient defenses. In this paper, we introduce Twisted-Stack, a new kind of approach-
dc.description.abstractthat randomizes the stack pointer which plays a role as the program counter in ROP attacks. More specifically, for mitigating the JIT-ROP attack, our solution places multiple stacks and randomly switches the stack at each call and ret site. By randomly switching the stacks, the adversary loses the control of the stack pointer at the ret site. If the stack pointer is lost, it makes it harder for the adversary to run the gadget. Even if one gadget is executed, the adversary loses the control of the stack pointer. Thus he will fail to execute the gadgets reliably. It is in effect equivalent to breaking the gadget chain. We have implemented Twisted-Stack as a compiler-based solution. And, we have evaluated Twisted-Stack using SPEC CPU2006 benchmark suites which measure the CPU-bound performance overhead. In our experiments, Twisted-Stack imposes a run-time overhead of 28% and a file-size overhead of 44%.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subject반환 지향형 프로그래밍-
dc.subject실시간 반환 지향형 프로그래밍 공격-
dc.subject메모리 노출 공격 완화-
dc.subject가젯 제거-
dc.subject랜덤화-
dc.subjectReturn-Oriented Programming-
dc.subjectJIT-ROP-
dc.subjectleakage-resilient-
dc.subjectGadget-less-
dc.subjectRandomization-
dc.titleTwisted-Stack-
dc.title.alternative스택 랜덤화를 통한 (실시간) 리턴 지향 프로그래밍 공격 완화-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthor이성만-
dc.title.subtitleStack randomization for mitigating (Just-in-time) return oriented programming-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0