Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Computers  /  Vol: 9 Par: 2 (2020)  /  Artículo
ARTÍCULO
TITULO

A Review of Memory Errors Exploitation in x86-64

Conor Pirry    
Hector Marco-Gisbert and Carolyn Begg    

Resumen

Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5 million for one single vulnerability in Android and up to USD 2 million for Apple?s operating system. In almost all cases, it is common to exploit memory errors in one or more stages to fully compromise those devices. In this paper, we review and discuss the importance of memory error vulnerabilities, and more specifically stack buffer overflows to provide a full view of how memory errors are exploited. We identify the root causes that make those attacks possible on modern x86-64 architecture in the presence of modern protection techniques. We have analyzed how unsafe library functions are prone to buffer overflows, revealing that although there are secure versions of those functions, they are not actually preventing buffer overflows from happening. Using secure functions does not result in software free from vulnerabilities and it requires developers to be security-aware. To overcome this problem, we discuss the three main security protection techniques present in all modern operating system; the non-eXecutable bit (NX), the Stack Smashing Protector (SSP) and the Address Space Layout Randomization (ASLR). After discussing their effectiveness, we conclude that although they provide a strong level of protection against classical exploitation techniques, modern attacks can bypass them.

Palabras claves

 Artículos similares

       
 
Muhammad Yasar Razzaq, Joamin Gonzalez-Gutierrez, Gregory Mertz, David Ruch, Daniel F. Schmidt and Stephan Westermann    
Four-dimensional (4D) printing technology, as a next-generation additive manufacturing method, enables printed objects to further change their shapes, functionalities, or properties upon exposure to external stimuli. The 4D printing of programmable and d... ver más
Revista: Applied Sciences

 
Filip Skala and Erika Zemková    
Fatigue caused by exercise or mentally demanding tasks can lead to an alteration in the cognitive functioning of athletes. Therefore, it is important to investigate whether and to what extent fatigue influences athletes cognitive performance in sports wi... ver más
Revista: Applied Sciences

 
Jawaher Alghamdi, Yuqing Lin and Suhuai Luo    
Efforts have been dedicated by researchers in the field of natural language processing (NLP) to detecting and combating fake news using an assortment of machine learning (ML) and deep learning (DL) techniques. In this paper, a review of the existing stud... ver más
Revista: Information

 
Michael Heigl, Enrico Weigelt, Dalibor Fiala and Martin Schramm    
Over the past couple of years, machine learning methods?especially the outlier detection ones?have anchored in the cybersecurity field to detect network-based anomalies rooted in novel attack patterns. However, the ubiquity of massive continuously genera... ver más
Revista: Applied Sciences

 
Yajun Zhu, Chengwen Zhong and Kun Xu    
The gas-kinetic scheme (GKS) and the unified gas-kinetic scheme (UGKS) are numerical methods based on the gas-kinetic theory, which have been widely used in the numerical simulations of high-speed and non-equilibrium flows. Both methods employ a multisca... ver más
Revista: Aerospace