作者
Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi
发表日期
2015/10/12
研讨会论文
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
页码范围
952-963
出版商
ACM
简介
Adversaries exploit memory corruption vulnerabilities to hijack a program's control flow and gain arbitrary code execution. One promising mitigation, control-flow integrity (CFI), has been the subject of extensive research in the past decade. One of the core findings is that adversaries can construct Turing-complete code-reuse attacks against coarse-grained CFI policies because they admit control flows that are not part of the original program. This insight led the research community to focus on fine-grained CFI implementations. In this paper we show how to exploit heap-based vulnerabilities to control the stack contents including security-critical values used to validate control-flow transfers. Our investigation shows that although program analysis and compiler-based mitigations reduce stack-based vulnerabilities, stack-based memory corruption remains an open problem. Using the Chromium web browser we …
引用总数
2015201620172018201920202021202220232024225333924342311174
学术搜索中的文章
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro… - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015