期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Leakage Is Prohibited:Memory Protection Extensions Protected Address Space Randomization 被引量:2
1
作者 Fei Yan Kai Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期546-556,共11页
Code reuse attacks pose a severe threat to modern applications. These attacks reuse existing code segments of vulnerable applications as attack payloads and hijack the control flow of a victim application. With high c... Code reuse attacks pose a severe threat to modern applications. These attacks reuse existing code segments of vulnerable applications as attack payloads and hijack the control flow of a victim application. With high code entropy and a relatively low performance overhead, Address Space Layout Randomization(ASLR) has become the most widely explored defense against code reuse attacks. However, a single memory disclosure vulnerability is able to compromise this defense. In this paper, we present Memory Protection Extensions(MPX)-assisted Address Space Layout Randomization(M-ASLR), a novel code-space randomization scheme. M-ASLR uses several characteristics of Intel MPX to restrict code pointers in memory. We have developed a fully functioning prototype of M-ALSR, and our evaluation results show that M-ASLR:(1) offers no interference with normal operation;(2) protects against buffer overflow attacks, code reuse attacks, and other sophisticated modern attacks;and(3) adds a very low performance overhead(3.3%) to C/C++ applications. 展开更多
关键词 ADDRESS SPACE Layout RANDOMIZATION (ASLR) intel memory protection extensions (mpx) code REUSE attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部