首页 | 官方网站   微博 | 高级检索  
     

面向缓解机制评估的自动化信息泄露方法
引用本文:杨松涛,陈凯翔,王准,张超.面向缓解机制评估的自动化信息泄露方法[J].软件学报,2022,33(6):2082-2096.
作者姓名:杨松涛  陈凯翔  王准  张超
作者单位:清华大学 计算机科学与技术系, 北京 海淀 100084;清华大学 网络科学与网络空间研究院, 北京 海淀 100084
基金项目:国家重点研发计划资助(2021YFB2701000); 国家自然科学基金(61972224, U1736209)
摘    要:自动生成漏洞利用样本(AEG)已成为评估漏洞的最重要的方式之一,但现有方案在目标系统部署有漏洞缓解机制时受到很大阻碍.当前主流的操作系统默认部署多种漏洞缓解机制,包括数据执行保护(DEP)和地址空间布局随机化(ASLR)等,而现有AEG方案仍无法面对所有漏洞缓解情形.提出了一种自动化方案EoLeak,可以利用堆漏洞实现自动化的信息泄露,进而同时绕过数据执行保护和地址空间布局随机化防御.EoLeak通过动态分析漏洞触发样本(POC)的程序执行迹,对执行迹中的内存布局进行画像并定位敏感数据(如代码指针),进而基于内存画像自动构建泄漏敏感数据的原语,并在条件具备时生成完整的漏洞利用样本.实现了EoLeak原型系统,并在一组夺旗赛(CTF)题目和多个实际应用程序上进行了实验验证.实验结果表明,该系统具有自动化泄露敏感信息和绕过DEP及ASLR缓解机制的能力.

关 键 词:信息泄漏  自动生成漏洞利用样本  动态分析  污点分析  内存画像
收稿时间:2021/9/5 0:00:00
修稿时间:2021/10/15 0:00:00

Exploit-oriented Automated Information Leakage
YANG Song-Tao,CHEN Kai-Xiang,WANG Zhun,ZHANG Chao.Exploit-oriented Automated Information Leakage[J].Journal of Software,2022,33(6):2082-2096.
Authors:YANG Song-Tao  CHEN Kai-Xiang  WANG Zhun  ZHANG Chao
Affiliation:Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China;Institute for Network Science and Cyberspace, Tsinghua University, Beijing 100084, China
Abstract:Automated exploit generation (AEG) has become one of the most important ways to demonstrate the exploitability of vulnerabilities. However, state-of-the-art AEG solutions in general assume the target system has no mitigations deployed, which is not true in modern operating systems since they often deploy mitigations like DEP (data execution prevention) and ASLR (address space layout randomization). This paper presents an automated solution EoLeak, able to exploit heap vulnerabilities to leak sensitive data and bypass ASLR and DEP at the same time. At a high level, EoLeak analyzes the program execution trace of the POC input that triggers the heap vulnerability, characterizes the memory profile from the trace and locates important data (e.g., code pointers), constructs leak primitives that discloses sensitive data, and generates exploits for the entire process when possible. We have implemented a prototype of EoLeak and evaluated it on a set of CTF binary programs and several real-world applications. Evaluation results showed that, EoLeak is effective at leaking data and generating exploits.
Keywords:information leakage  automated exploit generation  dynamic analysis  taint analysis  memory profiling
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号