On Return Oriented Programming Threats in Android Runtime

作者: Akshaya Venkateswara Raja , Jehyun Lee , Debin Gao

DOI: 10.1109/PST.2017.00038

关键词:

摘要: Android has taken a large share of operating systems for smart devices including smartphones, and been an attractive target to the attackers. The arms race between attackers defenders typically occurs on two front lines — latest attacking technology updates system (including defense mechanisms deployed). In terms technology, Return-Oriented Programming (ROP) is one most sophisticated attack methods devices. updates, Runtime (ART) was biggest change family. this paper, we investigate extent which makes attacks easier or more difficulty. particular, show that by updating libraries adopting Ahead-of-Time compiling instead Justin- Time in ART architecture, larger number diverse gadgets are disclosed ROP attackers, serve as direct ingredients attacks. We three six times found adopted versions due new runtime. Moreover, constrained situations where attacker requires specific instructions registers, running provides up 30% conditional coverage than pre-ART does. additionally demonstrate sample post- would not have possible Android.

参考文章(24)
Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Stewart, Michael Franz, Microgadgets: size does matter in turing-complete return-oriented programming WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies. pp. 7- 7 ,(2012)
Michalis Polychronakis, Angelos D. Keromytis, Vasilis Pappas, Transparent ROP exploit mitigation using indirect branch tracing usenix security symposium. pp. 447- 462 ,(2013)
Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, Peng Ning, On the Expressiveness of Return-into-libc Attacks Lecture Notes in Computer Science. pp. 121- 141 ,(2011) , 10.1007/978-3-642-23644-0_7
Fabian Monrose, Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection usenix security symposium. pp. 401- 416 ,(2014)
Radhakishan Yadav, Robin Singh Bhadoria, Performance Analysis for Android Runtime Environment international conference on communication systems and network technologies. pp. 1076- 1079 ,(2015) , 10.1109/CSNT.2015.52
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, A. Sadeghi, Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization ieee symposium on security and privacy. pp. 574- 588 ,(2013) , 10.1109/SP.2013.45
Tyler Bletsch, Xuxian Jiang, Vince W. Freeh, Zhenkai Liang, Jump-oriented programming Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11. pp. 30- 40 ,(2011) , 10.1145/1966913.1966919
Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee, From Zygote to Morula: Fortifying Weakened ASLR on Android ieee symposium on security and privacy. pp. 424- 439 ,(2014) , 10.1109/SP.2014.34
Kangjie Lu, Chengyu Song, Byoungyoug Lee, Simon Chung, Taesoo Kim, Wenke Lee, ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks computer and communications security. pp. 280- 291 ,(2015) , 10.1145/2810103.2813694
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy, Return-oriented programming without returns computer and communications security. pp. 559- 572 ,(2010) , 10.1145/1866307.1866370