Update on Q: Exploit Hardening Made Easy
نویسندگان
چکیده
After Q: Exploit Hardening Made Easy [2] appeared in Usenix Security 2011, we noticed a discrepancy in our results. Our experiments showed that we could create a ROP payload to call statically linked functions in 80% of programs larger than 20KB, and additionally dynamically linked functions in 80% of programs larger than 100KB. The only difference between the two experiments is that the latter experiment uses the GOT overwriting technique from Roglia et al. [1]. Roglia, et al. estimate that gadgets needed for GOT overwriting are available in 96% of x86 executables larger than 20KB. One would then expect that the two Q experiments would have similar results, rather than the dynamic case requiring a five times increase in code size to achieve a similar success rate. When we investigated this discrepancy, we found a bug in Q that sometimes prevented it from finding the gadgets described by Roglia et al. We have since corrected this bug and rerun the experiments. Figure 1 shows the updated version of Figure 4 in our original paper. There is now a negligible difference between the static and dynamic experiments as expected.
منابع مشابه
Q: Exploit Hardening Made Easy
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕X, a software defense that stops shellcode, by reusing instructions from large libraries such as libc. Modern operating systems have since enabled address randomization (ASLR), which randomizes the location of libc, making these techniques unusable in practice. However, modern ASLR implementations leave smaller ...
متن کاملEfficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack paths (combinations of exploits), from which one can decide whether a given set of network hardening measures guarantees the safety of given critical resources. We go beyond attack paths to compute actual se...
متن کاملThe self-similarity theory of high pressure torsion
By analyzing the problem of high pressure torsion (HPT) in the rigid plastic formulation, we show that the power hardening law of plastically deformed materials leads to self-similarity of HPT, admitting a simple mathematical description of the process. The analysis shows that the main parameters of HPT are proportional to β q , with β being the angle of the anvil rotation. The meaning of the p...
متن کاملParameter Study of GTN Model in a SLM Manufactured Lattice Structure under Compression by Using FEM
This study investigates the effect of material parameters of the Gurson-Tvergaard-Needleman (GTN) model on the failure prediction of cellular structures. The effect of elastic modulus, calibration parameter of GTN model, isotropic hardening, fracture strain, and strut diameter on the load-displacement curve of a lattice structure fabricated by Selective Laser Melting (SLM) has been studied by u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012