RUMA: On the Analysis of Defenses based on Misaligned Accesses

07/03/2018
by   Daehee Jang, et al.
0

The adoption of randomness against heap layout has rendered a good portion of heap vulnerabilities unexploitable. However, some remnants of vulnerabilities are still exploitable even under the randomized heap layout. According to our analysis, such heap exploits often require pointer-width allocation granularity to inject fake pointers. To address such problem, we explore the efficacy of adopting byte-level (unaligned or misaligned) allocation granularity as part of the heap exploit defenses since the pointer-spraying attack techniques are increasing. Heap randomization, in general, has been a well-trodden area. However, the efficacy of byte granularity randomization has never been fully explored as it involves unaligned heap memory access which degrades performance and raises compatibility issues. In this paper, we discuss byte-granularity heap randomization; and conduct comprehensive analysis in three folds: (i) security mitigation effectiveness, (ii) performance impact, and (iii) compatibility with existing applications. Moreover, we designed a new heap allocator (RUMA) considering the analysis results. Security discussion is based on case studies using 20 publicly disclosed heap vulnerabilities. Performance and compatibility analysis are based on cycle-level microbenchmark, SPEC2006, Coreutils, Nginx, and ChakraCore.

READ FULL TEXT
research
07/03/2018

Rethinking Misalignment to Raise the Bar for Heap Pointer Corruption

Heap layout randomization renders a good portion of heap vulnerabilities...
research
07/05/2020

Breaking and Fixing Destructive Code Read Defenses

Just-in-time return-oriented programming (JIT-ROP) is a powerful memory ...
research
07/05/2020

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Memory corruption vulnerabilities have been around for decades and rank ...
research
02/15/2023

Field-sensitive Data Flow Integrity

Although numerous defenses against memory vulnerability exploits have be...
research
09/08/2023

Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

This paper provides the first systematic analysis of a synergistic threa...
research
06/20/2019

An Extensible Framework for Quantifying the Coverage of Defenses Against Untrusted Foundries

The transistors used to construct Integrated Circuits (ICs) continue to ...
research
01/26/2021

The Granularity Gap Problem: A Hurdle for Applying Approximate Memory to Complex Data Layout

The main memory access latency has not much improved for more than two d...

Please sign up or login with your details

Forgot password? Click here to reset