Performance and Entropy of Various ASLR Implementations
نویسندگان
چکیده
Whether or not a security feature is useful is highly dependent on how effective it is and how it affects system performance. If a security feature is effective but greatly degrades the performance of the system, then the feature is not useful. Likewise, if a security feature is very fast but is not very effective, then it is also not useful. A useful security feature needs to add a reasonable amount of security to the system but at the same time not greatly impose on system performance. In our study, we measure the performance and entropy of ASLR implementations. The implementations we chose are in Debian, HardenedBSD, and FreeBSD with a patch from the HardenedBSD developers. For the most part, our results are not surprising. ASLR has a very marginal impact on performance, while providing excellent security benefits. The distributions in some cases passes a Chi-Squared (χ) test, but in some cases also does not. We describe our findings below in more detail. 1 Address Space Layout Randomization Address space layout randomization (ASLR) is an exploit mitigation technique implemented natively on many modern operating systems including GNU Linux, Mac OS X and Windows. ASLR takes the three parts of the program, the code, stack and heap, and places them at random addresses in the program’s address space. The challenge ASLR presents to attackers is that they must now attempt to guess addresses that before would have been known. For example, a common technique for exploiting vulnerabilities is a return-to-libc attack. In order for an attacker to be able to implement a return-to-libc attack, they must know the locations of certain functions in memory such as system or execv [A1]. Since the locations of system and execv are not known to the attacker when the process starts, the
منابع مشابه
Exploiting Linux and PaX ASLR’s weaknesses on 32- and 64-bit systems
Address Space Layout Randomization is a very effective mitigation technique. The first implementation was done by the PaX team in 2001, and since then it has been the most advanced and secure. We have analyzed the PaX an Linux implementations, and found several weaknesses. We have carried out a deep review and analysis of all constraints that determine ASLR operation. Based on these results we ...
متن کاملEffective Entropy: Security-Centric Metric for Memory Randomization Techniques
User space memory randomization techniques are an emerging field of cyber defensive technology which attempts to protect computing systems by randomizing the layout of memory. Quantitative metrics are needed to evaluate their effectiveness at securing systems against modern adversaries and to compare between randomization technologies. We introduce Effective Entropy, a measure of entropy in use...
متن کاملSGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
Traditional execution environments deploy Address Space Layout Randomization (ASLR) to defend against memory corruption attacks. However, Intel Software Guard Extension (SGX), a new trusted execution environment designed to serve security-critical applications on the cloud, lacks such an effective, well-studied feature. In fact, we find that applying ASLR to SGX programs raises non-trivial issu...
متن کاملReliability and validity of the active straight leg raise test in posterior pelvic pain since pregnancy.
STUDY DESIGN A cross-sectional analysis was performed in a group of women meeting strict criteria for posterior pelvic pain since pregnancy (PPPP). The scores on the Active Straight Leg Raise Test (ASLR test) were compared with the scores of healthy controls. OBJECTIVES To develop a new diagnostic instrument for use in patients with PPPP. The objectives of the present study were to assess the...
متن کاملASLR on the Line: Practical Cache Attacks on the MMU
Address space layout randomization (ASLR) is an important first line of defense against memory corruption attacks and a building block for many modern countermeasures. Existing attacks against ASLR rely on software vulnerabilities and/or on repeated (and detectable) memory probing. In this paper, we show that neither is a hard requirement and that ASLR is fundamentally insecure on modern cacheb...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015