luni, 3 septembrie 2018

NDSS 2018 K-Miner: Uncovering Memory Corruption in Linux

https://bit.ly/2Pi2nfw NucleusTechnologies secret sale page.
NDSS 2018 Session 5A: Software Security 01 K-Miner: Uncovering Memory Corruption in Linux SUMMARY Operating system kernels are appealing attack targets: compromising the kernel usually allows attackers to bypass all deployed security mechanisms and take control over the entire system. Commodity kernels, like Linux, are written in low-level programming languages that offer only limited type and memory-safety guarantees, enabling adversaries to launch sophisticated run-time attacks against the kernel by exploiting memory-corruption vulnerabilities. Many defenses have been proposed to protect operating systems at run time, such as control-flow integrity (CFI). However, the goal of these run-time monitors is to prevent exploitation as a symptom of memory corruption, rather than eliminating the underlying root cause, i.e., bugs in the kernel code. While finding bugs can be automated, e.g., using static analysis, all existing approaches are limited to local, intra-procedural checks, and face severe scalability challenges due to the large kernel code base. Consequently, there currently exist no tools for conducting global static analysis of operating system kernels. In this paper, we present K-Miner, a new framework to efficiently analyze large, commodity operating system kernels like Linux. Our novel approach exploits the highly standardized interface structure of the kernel code to enable scalable pointer analysis and conduct global, context-sensitive analysis. Through our inter-procedural analysis we show that K-Miner systematically and reliably uncovers several different classes of memory-corruption vulnerabilities, such as dangling pointers, user-after-free, double-free, and double-lock vulnerabilities. We thoroughly evaluate our extensible analysis framework, which leverages the popular and widely used LLVM compiler suite, for the current Linux kernel and demonstrate its effectiveness by reporting several memory-corruption vulnerabilities. SLIDES http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/03/NDSS2018_05A-1_Gens_Slides.pdf PAPER http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_05A-1_Gens_paper.pdf SLIDES http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/03/NDSS2018_05A-1_Gens_Slides.pdf AUTHORS David Gens (CYSEC/Technische Universitat Darmstadt) Simon Schmitt (CYSEC/Technische Universitat Darmstadt) Lucas Davi (CYSEC/Technische Universitat Darmstadt) Ahmad-Reza Sadeghi (CYSEC/Technische Universitat Darmstadt) Network and Distributed System Security (NDSS) Symposium 2018, 18-21 February 2018, Catamaran Resort Hotel & Spa in San Diego, California. https://www.ndss-symposium.org/ndss2018/programme/ ABOUT NDSS The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. https://www.ndss-symposium.org/ #NDSS #NDSS18 #NDSS2018 #InternetSecurity

Niciun comentariu:

Trimiteți un comentariu