UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Modular Synthesis of Heap Exploits

Repel, Dusan; Kinder, Johannes; Cavallaro, Lorenzo; (2017) Modular Synthesis of Heap Exploits. In: PLAS '17: Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. (pp. pp. 25-35). ACM (Association for Computing Machinery): New York, NY, United States. Green open access

[thumbnail of plas17.pdf]
Preview
Text
plas17.pdf - Accepted Version

Download (681kB) | Preview

Abstract

Memory errors continue to compromise the security of today's systems. Recent efforts to automatically synthesize exploits for stack-based buffer overflows promise to help assess a vulnerability's severity more quickly and alleviate the burden of manual reasoning. However, generation of heap exploits has been out of scope for such methods thus far. In this paper, we investigate the problem of automatically generating heap exploits, which, in addition to finding the vulnerability, requires intricate interaction with the heap manager. We identify the challenges involved in automatically finding the right parameters and interaction sequences for such attacks, which have traditionally required manual analysis. To tackle these challenges, we present a modular approach that is designed to minimize the assumptions made about the heap manager used by the target application. Our prototype system is able to find exploit primitives in six binary implementations of Windows and UNIX-based heap managers and applies these to successfully exploit two real-world applications.

Type: Proceedings paper
Title: Modular Synthesis of Heap Exploits
Event: CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security
Location: TX, Dallas
Dates: 30 Oct 2017
ISBN-13: 978-1-4503-5099-0
Open access status: An open access version is available from UCL Discovery
DOI: 10.1145/3139337.3139346
Publisher version: https://doi.org/10.1145/3139337.3139346
Language: English
Additional information: This version is the author-accepted manuscript. For information on re-use, please refer to the publisher’s terms and conditions.
Keywords: Exploitation, vulnerabilities, symbolic execution
UCL classification: UCL
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science
URI: https://discovery.ucl.ac.uk/id/eprint/10212289
Downloads since deposit
22Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item