Use-After-Free Mitigation via Protected Heap Allocation

被引:0
|
作者
Zhang, Mingbo [1 ]
Zonouz, Saman [1 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, New Brunswick, NJ 08901 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Use after free (UAF) exploits have contributed to many software memory corruption attacks in recent practice. They are especially popular in the world of web browsers. Despite many successful UAF exploits against widelyused applications, state-of-the-art defense mechanisms have proved to still leave the systems vulnerable. In this paper, we argue that a successful UAF exploit is feasible because of the fine-grained determinism provided by existing heap memory allocators. We introduce a new defense strategy, ZEUS, that leverages additional memory buffers to make allocation outcomes locally unpredictable to adversaries. This fine-grained non-determinism prevents exact alignment of subsequent allocations and in-object member fields. It significantly lowers the success rate of a UAF exploit even in the presence of heap sprays. We validated our defense using real recent UAF exploits against several CVE vulnerabilities in large and popular software packages (FireFox and Tor browsers). ZEUS was able to terminate all the exploits in early stages and prevented successful location of the gadget addresses for the follow-up return-oriented programming steps of the intrusion. ZEUS's runtime performance overhead was negligible (1.2% on average).
引用
收藏
页码:131 / 138
页数:8
相关论文
共 50 条
  • [1] An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification
    Yu, Yue
    Jia, Xiaoqi
    An, Xun
    Zhang, Shengzhi
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 507 - 523
  • [2] Preventing Use-After-Free Attacks with Fast Forward Allocation
    Wickman, Brian
    Hu, Hong
    Yun, Insu
    Jang, Daehee
    Lim, JungWon
    Kashyap, Sanidhya
    Kim, Taesoo
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2453 - 2470
  • [3] Dynamic Detection of Use-After-Free Bugs
    S. A. Asryan
    S. S. Gaissaryan
    Sh. F. Kurmangaleev
    A. M. Aghabalyan
    N. G. Hovsepyan
    S. S. Sargsyan
    Programming and Computer Software, 2019, 45 : 365 - 371
  • [4] Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone?
    Gui, Binfa
    Song, Wei
    Xiong, Hailong
    Huang, Jeff
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) : 4569 - 4589
  • [5] Detect use-after-free vulnerabilities in binaries
    Han X.
    Wei S.
    Ye J.
    Zhang C.
    Ye Z.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (10): : 1022 - 1029
  • [6] Dynamic Detection of Use-After-Free Bugs
    Asryan, S. A.
    Gaissaryan, S. S.
    Kurmangaleev, Sh F.
    Aghabalyan, A. M.
    Hovsepyan, N. G.
    Sargsyan, S. S.
    PROGRAMMING AND COMPUTER SOFTWARE, 2019, 45 (07) : 365 - 371
  • [7] DangSan: Scalable Use-after-free Detection
    van der Kouwe, Erik
    Nigade, Vinod
    Giuffrida, Cristiano
    PROCEEDINGS OF THE TWELFTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS 2017), 2017, : 405 - 419
  • [8] Uncovering Use-After-Free Conditions In Compiled Code
    Dewey, David
    Reaves, Bradley
    Traynor, Patrick
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 90 - 99
  • [9] Preventing Use-after-free with Dangling Pointers Nullification
    Lee, Byoungyoung
    Song, Chengyu
    Jang, Yeongjin
    Wang, Tielei
    Kim, Taesoo
    Lu, Long
    Lee, Wenke
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [10] UFO: Predictive Concurrency Use-After-Free Detection
    Huang, Jeff
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 609 - 619