Survey of Methods for Automated Code-Reuse Exploit Generation

نویسندگان

چکیده

This paper provides a survey of methods and tools for automated code-reuse exploit generation. Such exploits use code that is already contained in vulnerable program. The approach allows one to vulnerabilities the presence operating system protection prohibits data memory execution. contains description various methods: return-to-libc attack, return-oriented programming, jump-oriented others. We define fundamental terms: gadget, gadget frame, catalog. Moreover, we show that, fact, an instruction, set gadgets defines virtual machine. can reduce creation problem generation this Each particular executable file machine instruction set. provide searching determining their semantics (creating catalog). These allow get If Turing-complete, then compiler catalog as target architecture. However, some instructions be absent. Hence discuss several approaches replace missing with multiple gadgets. An tool chain by pattern (regular expressions) or considering semantics. Furthermore, chaining genetic algorithms, while others SMT-solvers. compare existing open-source propose testing rop-benchmark used verify whether generated successfully opens shell.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated code generation for discontinuous Galerkin methods

A compiler approach for generating low-level computer code from high-level input for discontinuous Galerkin finite element forms is presented. The input language mirrors conventional mathematical notation, and the compiler generates efficient code in a standard programming language. This facilitates the rapid generation of efficient code for general equations in varying spatial dimensions. Key ...

متن کامل

Towards Automated Exploit Generation for Embedded Systems

Manual vulnerability discovery and exploit development on an executable are very challenging tasks for developers. Therefore, the automation of those tasks is becoming interesting in the field of software security. In this paper, we implement an approach of automated exploit generation for firmware of embedded systems by extending an existing dynamic analysis framework called Avatar. Embedded s...

متن کامل

Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems

Software is everywhere, from mission critical systems such as industrial power stations, pacemakers and even household appliances. This growing dependence on technology and the increasing complexity software has serious security implications as it means we are potentially surrounded by software that contain exploitable vulnerabilities. These challenges have made binary analysis an important are...

متن کامل

A Semi-automated Process for Open Source Code Reuse

It is clear that Free Libre / Open Source Software (FLOSS) has been demonstrating increasing importance continually for some years now. As a result, millions of lines of code are becoming available online. In many cases, this code, is carefully designed, implemented, tested and therefore represents a very good option for reusability. Lately, more and more companies, especially Small and Medium ...

متن کامل

Typesafe Code Reuse Across ASTs via Code Generation

Writing data structures for abstract syntax trees (ASTs) in a conventional OO programming language is tedious and error-prone. Hence, programmers often use AST generators to generate OO code from a higher-level description. This article argues that the existing AST generators do not provide good support for programs that manipulate several similar structural variations of an AST. Using a conven...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Programming and Computer Software

سال: 2021

ISSN: ['0361-7688', '1608-3261']

DOI: https://doi.org/10.1134/s0361768821040071