Automatic techniques to systematically discover new heap exploitation primitives

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 159
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorInsu Yunko
dc.contributor.authorDhaval Kapilko
dc.contributor.authorTaesoo Kimko
dc.date.accessioned2021-02-07T23:50:16Z-
dc.date.available2021-02-07T23:50:16Z-
dc.date.created2021-02-08-
dc.date.created2021-02-08-
dc.date.issued2020-08-13-
dc.identifier.citation29th USENIX Security Symposium (Security '20), pp.1111 - 1128-
dc.identifier.urihttp://hdl.handle.net/10203/280624-
dc.description.abstractExploitation techniques to abuse metadata of heap allocators have been widely studied because of their generality (i.e., application independence) and powerfulness (i.e., bypassing modern mitigation). However, such techniques are commonly considered arts, and thus the ways to discover them remain ad-hoc, manual, and allocator-specific. In this paper, we present an automatic tool, ARCHEAP, to systematically discover the unexplored heap exploitation primitives, regardless of their underlying implementations. The key idea of ARCHEAP is to let the computer autonomously explore the spaces, similar in concept to fuzzing, by specifying a set of common designs of modern heap allocators and root causes of vulnerabilities as models, and by providing heap operations and attack capabilities as actions. During the exploration, ARCHEAP checks whether the combinations of these actions can be potentially used to construct exploitation primitives, such as arbitrary write or overlapped chunks. As a proof, ARCHEAP generates working PoC that demonstrates the discovered exploitation technique. We evaluated ARCHEAP with ptmalloc2 and 10 other allocators, and discovered five previously unknown exploitation techniques in ptmalloc2 as well as several techniques against seven out of 10 allocators including the security-focused allocator, DieHarder. To show the effectiveness of ARCHEAP's approach in other domains, we also studied how security features and exploit primitives evolve across different versions of ptmalloc2.-
dc.languageEnglish-
dc.publisherUSENIX Association-
dc.titleAutomatic techniques to systematically discover new heap exploitation primitives-
dc.typeConference-
dc.identifier.scopusid2-s2.0-85091928804-
dc.type.rimsCONF-
dc.citation.beginningpage1111-
dc.citation.endingpage1128-
dc.citation.publicationname29th USENIX Security Symposium (Security '20)-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationVirtual-
dc.contributor.localauthorInsu Yun-
dc.contributor.nonIdAuthorDhaval Kapil-
dc.contributor.nonIdAuthorTaesoo Kim-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0