KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities

被引:0
|
作者
Wu, Wei [1 ,2 ,3 ]
Chen, Yueqi [2 ]
Xing, Xinyu [2 ]
Zou, Wei [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, CAS KLONAT, Key Lab Network Assessment Technol,CAS, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, BKLONSPT, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic exploit generation is a challenging problem. A challenging part of the task is to connect an identified exploitable state (exploit primitive) to triggering execution of code-reuse (e.g., ROP) payload. A control-flow hijacking primitive is one of the most common capabilities for exploitation. However, due to the challenges of widely deployed exploit mitigations, pitfalls along an exploit path, and ill-suited primitives, it is difficult to even manually craft an exploit with a control-flow hijacking primitive for an off-the-shelf modern Linux kernel. We propose KEPLER to facilitate exploit generation by automatically generating a "single-shot" exploitation chain. KEPLER accepts as input a control-flow hijacking primitive and bootstraps any kernel ROP payload by symbolically stitching an exploitation chain taking advantage of prevalent kernel coding style and corresponding gadgets. Comparisons with previous automatic exploit generation techniques and previous kernel exploit techniques show KEPLER effectively facilitates evaluation of control-flow hijacking primitives in the Linux kernel.
引用
收藏
页码:1187 / 1204
页数:18
相关论文
共 25 条
  • [21] VM-CFI: Control-Flow Integrity for Virtual Machine Kernel Using Intel PT
    Kwon, Donghyun
    Seo, Jiwon
    Baek, Sehyun
    Kim, Giyeol
    Ahn, Sunwoo
    Paek, Yunheung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT V, 2018, 10964 : 127 - 137
  • [22] Control-Flow Refinement by Partial Evaluation, and its Application to Termination and Cost Analysis
    Domenech, Jesus J.
    Gallagher, John P.
    Genaim, Samir
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2019, 19 (5-6) : 990 - 1005
  • [23] Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach
    Dongyang Zhan
    Lin Ye
    Binxing Fang
    Hongli Zhang
    Xiaojiang Du
    Soft Computing, 2018, 22 : 7977 - 7987
  • [24] Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach
    Zhan, Dongyang
    Ye, Lin
    Fang, Binxing
    Zhang, Hongli
    Du, Xiaojiang
    SOFT COMPUTING, 2018, 22 (23) : 7977 - 7987
  • [25] Numerical Evaluation of the "Dual-Kernel, Counter-flow" Matric Convolution Integral that Arises in Discrete/Continuous (D/C) Control Theory
    Nixon, D. D.
    Johnson, C. D.
    SSST: 2009 41ST SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2009, : 285 - +