27
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Analyzing the Gadgets Towards a Metric to Measure Gadget Quality

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Current low-level exploits often rely on code-reuse, whereby short sections of code (gadgets) are chained together into a coherent exploit that can be executed without the need to inject any code. Several protection mechanisms attempt to eliminate this attack vector by applying code transformations to reduce the number of available gadgets. Nevertheless, it has emerged that the residual gadgets can still be sufficient to conduct a successful attack. Crucially, the lack of a common metric for "gadget quality" hinders the effective comparison of current mitigations. This work proposes four metrics that assign scores to a set of gadgets, measuring quality, usefulness, and practicality. We apply these metrics to binaries produced when compiling programs for architectures implementing Intel's recent MPX CPU extensions. Our results demonstrate a 17% increase in useful gadgets in MPX binaries, and a decrease in side-effects and preconditions, making them better suited for ROP attacks.

          Related collections

          Most cited references8

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          The geometry of innocent flesh on the bone

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Return-oriented programming without returns

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A brief history of just-in-time

                Bookmark

                Author and article information

                Journal
                2016-05-26
                Article
                1605.08159
                f5484775-4329-4684-981e-aaf3c35ed82d

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                International Symposium on Engineering Secure Software and Systems, Apr 2016, London, United Kingdom
                cs.SE cs.CR
                ccsd

                Software engineering,Security & Cryptology
                Software engineering, Security & Cryptology

                Comments

                Comment on this article