Skip to main content

2014 | OriginalPaper | Buchkapitel

13. ‘Weird Machine’ Patterns

verfasst von : Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Michael E. Locasto, Daniel Bilar

Erschienen in: Cyberpatterns

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

You do not understand how your program really works until it has been exploited. We believe that computer scientists and software engineers should regard the activity of modern exploitation as an applied discipline that studies both the actual computational properties and the practical computational limits of a target platform or system. Exploit developers study the computational properties of software that are not studied elsewhere, and they apply unique engineering techniques to the challenging engineering problem of dynamically patching and controlling a running system. These techniques leverage software and hardware composition mechanisms in unexpected ways to achieve such control. Although unexpected, such composition is not arbitrary, and it forms the basis of a coherent engineering workflow. This chapter contains a top-level overview of these approaches and their historical development.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
It also serves as an excellent teaching aid in advanced OS courses; see, e.g., [4].
 
2
This fact was not well understood by most engineers or academics, who regarded below-compiler OS levels as unpredictable; Stephanie Forrest deserves credit for putting this and other misconceptions into broader scientific perspective.
 
3
Which it pre-dates, together with other hacker descriptions of the technique, by five to seven years.
 
Literatur
1.
Zurück zum Zitat Bratus S, Locasto ME, Patterson ML, Sassaman L, Shubina A. Exploit programming: from buffer overflows to “weird machines” and theory of computation. login: Dec 2011. Bratus S, Locasto ME, Patterson ML, Sassaman L, Shubina A. Exploit programming: from buffer overflows to “weird machines” and theory of computation. login: Dec 2011.
2.
Zurück zum Zitat Shacham H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the \(\times 86\)). In: Proceedings of the 14th ACM conference on computer and communications security, CCS ’07. New York: ACM; p. 552–561. Shacham H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the \(\times 86\)). In: Proceedings of the 14th ACM conference on computer and communications security, CCS ’07. New York: ACM; p. 552–561.
3.
Zurück zum Zitat Roemer R, Buchanan E, Shacham H, Savage S. Return-oriented programming: systems, languages, and applications. ACM Trans Inf Syst Secur. 2012;15(1):2:1–2:34. Roemer R, Buchanan E, Shacham H, Savage S. Return-oriented programming: systems, languages, and applications. ACM Trans Inf Syst Secur. 2012;15(1):2:1–2:34.
5.
Zurück zum Zitat Holler C, Herzig K, Zeller A. Fuzzing with code fragments. In: Proceedings of the 21st USENIX conference on security symposium, Security’12. Berkeley: USENIX Association; 2012. p. 38–38. Holler C, Herzig K, Zeller A. Fuzzing with code fragments. In: Proceedings of the 21st USENIX conference on security symposium, Security’12. Berkeley: USENIX Association; 2012. p. 38–38.
6.
Zurück zum Zitat Caballero Juan, Song Dawn. Automatic protocol reverse-engineering: message format extraction and field semantics inference. Comput Netw. 2013;57(2):451–74.CrossRef Caballero Juan, Song Dawn. Automatic protocol reverse-engineering: message format extraction and field semantics inference. Comput Netw. 2013;57(2):451–74.CrossRef
7.
Zurück zum Zitat Samuel M, Erlingsson Ú. Let’s parse to prevent pwnage invited position paper. In: Proceedings of the 5th USENIX conference on Large-scale exploits and emergent threats, LEET’12, Berkeley, USA: USENIX Association; 2012. p. 3–3. Samuel M, Erlingsson Ú. Let’s parse to prevent pwnage invited position paper. In: Proceedings of the 5th USENIX conference on Large-scale exploits and emergent threats, LEET’12, Berkeley, USA: USENIX Association; 2012. p. 3–3.
8.
Zurück zum Zitat Jana s, Shmatikov V. Abusing file processing in malware detectors for fun and profit. In: IEEE symposium on security and privacy’12; 2012. p. 80–94. Jana s, Shmatikov V. Abusing file processing in malware detectors for fun and profit. In: IEEE symposium on security and privacy’12; 2012. p. 80–94.
9.
Zurück zum Zitat Xi W, Haogang C, Alvin C, Zhihao J, Nickolai Z, Kaashoek MF. Undefined behavior: what happened to my code? In: Proceedings of the Asia-Pacific workshop on systems, APSYS’12. New York, USA: ACM; 2012. p. 9:1–9:7. Xi W, Haogang C, Alvin C, Zhihao J, Nickolai Z, Kaashoek MF. Undefined behavior: what happened to my code? In: Proceedings of the Asia-Pacific workshop on systems, APSYS’12. New York, USA: ACM; 2012. p. 9:1–9:7.
10.
Zurück zum Zitat Dullien T. Exploitation and state machines: programming the “weird machine”, revisited. In: Infiltrate conference, Apr 2011. Dullien T. Exploitation and state machines: programming the “weird machine”, revisited. In: Infiltrate conference, Apr 2011.
11.
Zurück zum Zitat Sassaman L, Patterson ML, Bratus S, Locasto ME, Shubina A. Security applications of formal language theory. Dartmouth College: Technical report; 2011. Sassaman L, Patterson ML, Bratus S, Locasto ME, Shubina A. Security applications of formal language theory. Dartmouth College: Technical report; 2011.
13.
Zurück zum Zitat Cesare. S. Shared library call redirection via ELF PLT, Infection. Dec 2000. Cesare. S. Shared library call redirection via ELF PLT, Infection. Dec 2000.
14.
Zurück zum Zitat Sd, Devik. Linux On-the-fly Kernel patching without LKM, Dec 2001. Sd, Devik. Linux On-the-fly Kernel patching without LKM, Dec 2001.
16.
Zurück zum Zitat Nergal. The advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Mag. 2001;58(4). Nergal. The advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Mag. 2001;58(4).
17.
Zurück zum Zitat Oakley J, Sergey B. Exploiting the hard-working dwarf: Trojan and exploit techniques with no native executable code. In WOOT. 2011. p. 91–102. Oakley J, Sergey B. Exploiting the hard-working dwarf: Trojan and exploit techniques with no native executable code. In WOOT. 2011. p. 91–102.
18.
Zurück zum Zitat Skape. Locreate: an anagram for relocate. Uninformed. 2007;6. Skape. Locreate: an anagram for relocate. Uninformed. 2007;6.
19.
Zurück zum Zitat Sotirov A. Heap feng shui in javascript. In: Blackhat; 2007. Sotirov A. Heap feng shui in javascript. In: Blackhat; 2007.
20.
Zurück zum Zitat Redpantz. The art of exploitation: MS IIS 7.5 remote heap overflow. Phrack Mag. 68(12), Apr 2012. Redpantz. The art of exploitation: MS IIS 7.5 remote heap overflow. Phrack Mag. 68(12), Apr 2012.
21.
Zurück zum Zitat Huku, Argp. The art of exploitation: exploiting VLC, a jemalloc case study. Phrack Maga. 2012;68(13). Huku, Argp. The art of exploitation: exploiting VLC, a jemalloc case study. Phrack Maga. 2012;68(13).
22.
Zurück zum Zitat Ferguson J. Advances in win32 aslr evasion, May 2011. Ferguson J. Advances in win32 aslr evasion, May 2011.
23.
Zurück zum Zitat Bilar D. On callgraphs and generative mechanisms. J Comput Virol. 2007;3(4). Bilar D. On callgraphs and generative mechanisms. J Comput Virol. 2007;3(4).
24.
Zurück zum Zitat Richarte D. About exploits writing. Core security technologies presentation 2002. Richarte D. About exploits writing. Core security technologies presentation 2002.
25.
Zurück zum Zitat Gera, Riq. Advances in format string exploitation. Phrack Mag. 2002;59(7). Gera, Riq. Advances in format string exploitation. Phrack Mag. 2002;59(7).
33.
Zurück zum Zitat The Grugq. Cheating the ELF: subversive dynamic linking to libraries, 2000. The Grugq. Cheating the ELF: subversive dynamic linking to libraries, 2000.
Metadaten
Titel
‘Weird Machine’ Patterns
verfasst von
Sergey Bratus
Julian Bangert
Alexandar Gabrovsky
Anna Shubina
Michael E. Locasto
Daniel Bilar
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-04447-7_13

Premium Partner