Survey of Methods for Automated Code-Reuse Exploit Generation
نویسندگان
چکیده
This paper provides a survey of methods and tools for automated code-reuse exploit generation. Such exploits use code that is already contained in vulnerable program. The approach allows one to vulnerabilities the presence operating system protection prohibits data memory execution. contains description various methods: return-to-libc attack, return-oriented programming, jump-oriented others. We define fundamental terms: gadget, gadget frame, catalog. Moreover, we show that, fact, an instruction, set gadgets defines virtual machine. can reduce creation problem generation this Each particular executable file machine instruction set. provide searching determining their semantics (creating catalog). These allow get If Turing-complete, then compiler catalog as target architecture. However, some instructions be absent. Hence discuss several approaches replace missing with multiple gadgets. An tool chain by pattern (regular expressions) or considering semantics. Furthermore, chaining genetic algorithms, while others SMT-solvers. compare existing open-source propose testing rop-benchmark used verify whether generated successfully opens shell.
منابع مشابه
Automated code generation for discontinuous Galerkin methods
A compiler approach for generating low-level computer code from high-level input for discontinuous Galerkin finite element forms is presented. The input language mirrors conventional mathematical notation, and the compiler generates efficient code in a standard programming language. This facilitates the rapid generation of efficient code for general equations in varying spatial dimensions. Key ...
متن کاملTowards Automated Exploit Generation for Embedded Systems
Manual vulnerability discovery and exploit development on an executable are very challenging tasks for developers. Therefore, the automation of those tasks is becoming interesting in the field of software security. In this paper, we implement an approach of automated exploit generation for firmware of embedded systems by extending an existing dynamic analysis framework called Avatar. Embedded s...
متن کاملSurvey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems
Software is everywhere, from mission critical systems such as industrial power stations, pacemakers and even household appliances. This growing dependence on technology and the increasing complexity software has serious security implications as it means we are potentially surrounded by software that contain exploitable vulnerabilities. These challenges have made binary analysis an important are...
متن کاملA Semi-automated Process for Open Source Code Reuse
It is clear that Free Libre / Open Source Software (FLOSS) has been demonstrating increasing importance continually for some years now. As a result, millions of lines of code are becoming available online. In many cases, this code, is carefully designed, implemented, tested and therefore represents a very good option for reusability. Lately, more and more companies, especially Small and Medium ...
متن کاملTypesafe Code Reuse Across ASTs via Code Generation
Writing data structures for abstract syntax trees (ASTs) in a conventional OO programming language is tedious and error-prone. Hence, programmers often use AST generators to generate OO code from a higher-level description. This article argues that the existing AST generators do not provide good support for programs that manipulate several similar structural variations of an AST. Using a conven...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Programming and Computer Software
سال: 2021
ISSN: ['0361-7688', '1608-3261']
DOI: https://doi.org/10.1134/s0361768821040071