Combating the Advanced Memory Exploitation Techniques: Detecting ROP with Memory Information Leak
nEINEI, Research Scientist @ McAfee Labs Chong Xu, Director of IPS Research @ McAfee Labs CanSecWest2014
March 20, 2014
Combating the Advanced Memory Exploitation Techniques: Detecting - - PowerPoint PPT Presentation
Combating the Advanced Memory Exploitation Techniques: Detecting ROP with Memory Information Leak nEINEI, Research Scientist @ McAfee Labs Chong Xu, Director of IPS Research @ McAfee Labs CanSecWest2014 March 20, 2014 Bio nEINEI
March 20, 2014
March 20, 2014 2
March 20, 2014 3
March 20, 2014 4
March 20, 2014 5
March 20, 2014 6
March 20, 2014 7
March 20, 2014 8
March 20, 2014 9
March 20, 2014 10
Replace the current kernel_stack->eip with the address that the handler can return to ROP detection function.
March 20, 2014 11
– Inject our own DLL (i.e., myring3.dll) into the target process – Parse the PE structure of the ROP module, and copy the entire .text section to a new allocated memory region ”new_text_code”; Set the memory attribute of the original .text section of ROP module to PAGE_READONLY to make it NO_EXECUTE – Suspend all threads, except for the current thread itself – Notify the Ring0 driver to start the address redirection
– DLL module does instruction analysis and logs the exception information and analysis results
March 20, 2014 12
March 20, 2014 13
March 20, 2014 14
March 20, 2014 15
March 20, 2014 16
March 20, 2014 17
March 20, 2014 18
March 20, 2014 19
equivalen ce
March 20, 2014 20
March 20, 2014 21
March 20, 2014 22
March 20, 2014 23
March 20, 2014 24
March 20, 2014 25
March 20, 2014 26
March 20, 2014 27
March 20, 2014 28
March 20, 2014 29
March 20, 2014 30
March 20, 2014 31