prolog to lecture 9 cs 236 on line ms program networks
play

Prolog to Lecture 9 CS 236 On-Line MS Program Networks and Systems - PowerPoint PPT Presentation

Prolog to Lecture 9 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 9 Page 1 CS 236 Online Buffer Overflows Buffer overflows are a big problem One class of defenses concentrates on not allowing attacker


  1. Prolog to Lecture 9 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 9 Page 1 CS 236 Online

  2. Buffer Overflows • Buffer overflows are a big problem • One class of defenses concentrates on not allowing attacker to write – Don’t let him put his attack code in your memory • If he can’t write his attack code, he can’t attack you – Can he . . .? Lecture 9 Page 2 CS 236 Online

  3. Return Oriented Programming • Unfortunately, he can • A technique called return oriented programming allows it • How? • Attacker doesn’t insert new code • He makes use of code already there Lecture 9 Page 3 CS 236 Online

  4. The Basic Idea • Attacker overwrites the stack – Which needs to be writeable – But not necessarily executable • Overwrites correct return addresses with new ones • Addresses pointing to code in your system that does attacker’s job for him Lecture 9 Page 4 CS 236 Online

  5. How Likely Is That? • How likely is it that I have code lying around that does what attackers want? • How likely is it that they can find it and use it this way? • Unfortunately, not just likely, but certain Lecture 9 Page 5 CS 236 Online

  6. The Return Oriented Technique • Don’t look for one big piece of code that does what you want • Find lots of little pieces you can stitch together • In something you know will be there – Like the C libraries Lecture 9 Page 6 CS 236 Online

  7. Can This Really Work? • Yes • This technique has hacked a voting machine and Adobe Acrobat – Of course, practically any attack technique seems to work on Acrobat • Researchers have built “compilers” that create arbitrary programs this way – Out of bits of C libraries Lecture 9 Page 7 CS 236 Online

  8. The Implications 1. Techniques based on prevention of code injection are insufficient 2. More broadly, proposed solutions to security problems need to be examined very carefully Lecture 9 Page 8 CS 236 Online

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend