in memory an evolution of attacks
play

in memory: an evolution of attacks Mathias Payer - PowerPoint PPT Presentation

in memory: an evolution of attacks Mathias Payer <mathias.payer@nebelwelt.net> UC Berkeley Images (c) MGM, WarGames, 1983 Memory attacks: an ongoing war Vulnerability classes according to CVE Memory attacks: an ongoing war David


  1. … in memory: an evolution of attacks Mathias Payer <mathias.payer@nebelwelt.net> UC Berkeley Images (c) MGM, WarGames, 1983

  2. Memory attacks: an ongoing war Vulnerability classes according to CVE

  3. Memory attacks: an ongoing war David Lightman: Hey, I don't believe that any system is totally secure."

  4. Memory attacks: an ongoing war ● Low-level languages trade type safety and memory safety for performance – Programmer in control of all checks ● Large set of legacy and new applications written in C / C++ prone to memory bugs ● Too many bugs to find and fix manually – Protect integrity through low-level security policy

  5. Memory corruption Memory corruption

  6. Memory corruption ● Unintended modification of memory location due to missing / faulty safety check – Exploitable only if address or value input dependent – Attacker sees all memory, controls writable memory void vulnerable(int user1, int *array) { // missing bound check for user1 array[user1] = 42; }

  7. Memory safety: temporal error void vulnerable(char *buf) { free(buf); buf[12] = 42; }

  8. Memory safety: spatial error void vulnerable() { char buf[12]; char *ptr = buf[11]; *ptr++ = 10; *ptr = 42; }

  9. Control-flow hijacking: Control-flow hijacking: Attack opportunities Attack opportunities

  10. Control-flow hijack attack ● Attacker modifies code pointer 1 – Function return – Indirect jump 2 3 – Indirect call 4 ● Control-flow leaves static graph 4' ● Reuse existing code – Return-oriented programming – Jump-oriented programming

  11. Control-flow hijack attack void vuln(char *u1) { // assert(strlen(u1)) < MAX char tmp[MAX]; strcpy(tmp, u1); return strcmp(tmp, "foo"); } vuln(&exploit); tmp[MAX] saved base pointer return address 1st argument: *u1 next stack frame

  12. Control-flow hijack attack void vuln(char *u1) { Memory safety Violation // assert(strlen(u1)) < MAX char tmp[MAX]; strcpy(tmp, u1); return strcmp(tmp, "foo"); Integrity *C } vuln(&exploit); Randomization &C tmp[MAX] don't care Flow Integrity *&C saved base pointer don't care points to &system() return address ebp after system call 1st argument: *u1 Control-flow Attack 1st argument to system() next stack frame hijack

  13. Code corruption attack Code Heap Stack C ● Code modified or new code added ● Hardware protection enforces code integrity

  14. Control-flow hijacking: Control-flow hijacking: Defense strategies Defense strategies

  15. Defense strategies Memory safety Stop memory corruption Violation – Safe dialects of C/C++: CCured, Cyclone Integrity *C – Retrofit on C/C++: SoftBounds+CETS Randomization &C – Rewrite in safe language: Java/C# Flow Integrity *&C Control-flow Attack hijack

  16. Defense strategies Memory safety Enforce integrity of Violation reads/writes – Write Integrity Testing Integrity *C – (DEP and W^X for code) Randomization &C Flow Integrity *&C Control-flow Attack hijack

  17. Defense strategies Memory safety Probabilistic defenses Violation – Randomize locations, code, data, or pointer Integrity *C values Randomization &C Flow Integrity *&C Control-flow Attack hijack

  18. Defense strategies Memory safety Protect control transfers Violation – Data-flow integrity – Control-flow integrity Integrity *C Randomization &C Flow Integrity *&C Control-flow Attack hijack

  19. Control-Flow Integrity ● Dynamic control flow must follow the 1 static control flow graph (CFG) 2 3 – Use points-to analysis to get CFG – Runtime check if target in static set 4 ● Current implementations over-approximate – Imprecision of static analysis, runtime concerns – One set each for indirect calls, jumps, and returns

  20. CFI: Limitations and Drawbacks ● Precision limited by static type analysis – Imprecision leads to ambiguities ● Static analysis must “see” all code – Support for dynamic libraries challenging ● Performance overhead or imprecision – Current implementations (greatly) over-approximate target set to achieve performance and compatibility

  21. Model for memory attacks Memory safety Memory corruption Integrity C *C D *D Randomization &C &D Flow Integrity *&C *&D Code Control-flow Bad things Data-only corruption hijack

  22. Data-only attacks Data-only attacks

  23. Data-only attack Code Heap Stack D ● Privileged or informative data changed – Simple, powerful and hard to detect

  24. Deployed defenses Deployed defenses

  25. Data Execution Prevention ● Enforces code integrity on page granularity – Execute code if eXecutable bit set ● W^X ensures write access or executable – Mitigates against code corruption attacks – Low overhead, hardware enforced, widely deployed ● Weaknesses and limitations – No-self modifying code supported

  26. Data Execution Prevention Memory safety Memory corruption Integrity C *C D *D Randomization &C &D Flow Integrity *&C *&D Code Control-flow Bad things Data-only corruption hijack

  27. Address Space Layout Randomization ● Randomizes locations of code and data regions – Probabilistic defense – Depends on loader and OS ● Weaknesses and limitations – Prone to information leaks – Some regions remain static (on x86) – Performance impact (~10%)

  28. ASLR: Performance overhead ● ASLR uses one register for PIC / ASLR code – Performance degradation on x86

  29. Address Space Layout Randomization Memory safety Memory corruption Integrity C *C D *D Randomization &C &D Flow Integrity *&C *&D Code Control-flow Bad things Data-only corruption hijack

  30. Stack canaries ● Protect return instruction pointer on stack – Compiler modifies stack layout – Probabilistic protection ● Weaknesses and limitations – Prone to information leaks – No protection against targeted writes / reads

  31. Stack canaries Memory safety Memory corruption Integrity C *C D *D Randomization &C &D Flow Integrity *&C *&D Code Control-flow Bad things Data-only corruption hijack

  32. Widely deployed defenses ● Memory safety: none ● Integrity: partial – Code integrity: W^X – Code pointer integrity: canaries and safe exceptions – Data integrity: none ● Randomization: partial – Address Space Layout Randomization ● Control/Data-flow integrity: none

  33. Widely deployed defenses Memory safety Memory corruption Integrity C C *C *C D *D Randomization &C &C &D &D Flow Integrity *&C *&D Code Code Control-flow Control-flow Bad things Data-only Data-only corruption corruption hijack hijack

  34. Widely deployed defenses Memory safety Memory corruption Mr. McKittrick, after very careful Integrity C C *C *C D *D consideration, sir, I've come to the conclusion that your new Randomization defense system sucks. &C &C &D &D Flow Integrity *&C *&D Code Code Control-flow Control-flow Bad things Data-only Data-only corruption corruption hijack hijack

  35. Why did stronger defenses fail? ● Too much overhead – More than 10% is not feasible ● Compatibility to legacy and source code – Shared library support, no code modifications ● Effectiveness against attacks – Protection against complete classes of attacks

  36. Onwards? Onwards? (c) MGM

  37. Partial? Data Integrity ● Memory safety stops control-flow hijack attacks – … but memory safety has high overhead – SoftBounds+CETS reports up to 250% overhead ● Enforce memory safety for “some” pointers – Compiler analysis can help – Tricky engineering to make it work

  38. Secure execution platform ● Must support legacy, binary code ● Dynamic binary translation allows virtualization ● Leverage runtime information – Enables preciser security checks

  39. Secure execution platform Application Kernel

  40. Secure execution platform Sandbox Loader Application System call policy Kernel

  41. Sandbox implementation Dynamic binary translator ● Check targets and origins ● Weave guards into code Original code Protected code 1 1' 2 3 2' 3' 4 4'

  42. Conclusion ● Low level languages are here to stay – We need protection against memory vulnerabilities – Performance, legacy, compatibility ● Mitigate control-flow hijack attacks – Secure execution platform for legacy code ● Future directions: strong policies for data

  43. ? If the winning move is not to If the winning move is not to play then we need to change play then we need to change the rules of the game! the rules of the game! http://nebelwelt.net http://nebelwelt.net Pictures (c) MGM

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend