LOBOTOMY An Architecture for JIT Spraying Mitigation

被引:4
|
作者
Jauernig, Martin [1 ]
Neugschwandtner, Matthias [1 ]
Platzer, Christian [1 ]
Comparetti, Paolo Milani [2 ]
机构
[1] Vienna Univ Technol, Vienna, Austria
[2] Lastline Inc, Redwood City, CA USA
关键词
D O I
10.1109/ARES.2014.14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
JIT spraying has an assured spot in an attacker's toolkit for Web browser exploitation: With JIT spraying an attacker is able to circumvent even the most sophisticated defense strategies against code injection, including address space layout randomization (ASLR), data execution prevention (DEP) and stack canaries. In this paper, we present LOBOTOMY, an architecture for building injection-safe JIT engines. LOBOTOMY is secure by design: it separates compiler and executor of a JIT engine in different processes that share the memory regions containing the compiled code. This allows us to use least-privilege access rights for both processes, preventing memory regions to be mapped with write-and execute-rights at the same time. Our proof-of-concept implementation that modifies the well-known Firefox JIT engine Tracemonkey shows both the effectiveness and real-world feasibility of our architecture. Additionally, we provide a thorough evaluation of our version compared to an unmodified baseline and competing approaches.
引用
收藏
页码:50 / 58
页数:9
相关论文
共 50 条
  • [31] A Novel Wireless Sensor Network Architecture for Crowd Disaster Mitigation
    Ramesh, Maneesha V.
    Anjitha, S.
    Rekha, P.
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [32] DAGGER: Distributed Architecture for Granular Mitigation of Mobile Based Attacks
    Bakhit, Khaled
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2014 IEEE/ACS 11TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2014, : 259 - 265
  • [33] Decomposable Architecture and Fault Mitigation Methodology for Deep Learning Accelerators
    Huang, Ning-Chi
    Yang, Min-Syue
    Chang, Ya-Chu
    Wu, Kai-Chiang
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 298 - 305
  • [34] A novel scaleable architecture for intrusion detection and mitigation in switched networks
    Witzke, EL
    Tarman, TD
    Ghosh, S
    Woodard, G
    2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 395 - 399
  • [35] An autonomous spraying robot architecture for sucker management in large-scale hazelnut orchards
    Lippi, Martina
    Santilli, Matteo
    Carpio, Renzo Fabrizio
    Maiolini, Jacopo
    Garone, Emanuele
    Cristofori, Valerio
    Gasparri, Andrea
    JOURNAL OF FIELD ROBOTICS, 2024, 41 (07) : 2114 - 2132
  • [36] Hybridized composite architecture for mitigation of non-penetrating ballistic trauma
    Vargas-Gonzalez, Lionel R.
    Gurganus, James C.
    INTERNATIONAL JOURNAL OF IMPACT ENGINEERING, 2015, 86 : 295 - 306
  • [37] Phase noise mitigation architecture for wireless full-duplex transceivers
    Quan, Xin
    Pan, Wensheng
    Liu, Ying
    Tang, Youxi
    ELECTRONICS LETTERS, 2018, 54 (24) : 1407 - 1409
  • [38] ADAM: Architecture for Write DisturbAnce Mitigation in Scaled Phase Change Memory
    Swami, Shivam
    Mohanram, Kartik
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1235 - 1240
  • [39] A new predistortion architecture with sampling clock jitter mitigation for wideband systems
    Liu, Ying
    Pan, Wensheng
    Shao, Shihai
    Tang, Youxi
    Proceedings - IEEE Global Communications Conference, GLOBECOM, 2013, : 3241 - 3246
  • [40] Mixer Architecture with Improved Image Rejection and Interference Mitigation for Cognitive Radio
    Varun, D.
    Kadambi, Govind R.
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,