Analyzing the gadgets: Towards a metric to measure gadget quality

14Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Current low-level exploits often rely on code-reuse, whereby short sections of code (gadgets) are chained together into a coherent exploit that can be executed without the need to inject any code. Several protection mechanisms attempt to eliminate this attack vector by applying code transformations to reduce the number of available gadgets. Nevertheless, it has emerged that the residual gadgets can still be sufficient to conduct a successful attack. Crucially, the lack of a common metric for “gadget quality” hinders the effective comparison of current mitigations. This work proposes four metrics that assign scores to a set of gadgets, measuring quality, usefulness, and practicality. We apply these metrics to binaries produced when compiling programs for architectures implementing Intel’s recent MPX CPU extensions. Our results demonstrate a 17% increase in useful gadgets in MPX binaries, and a decrease in sideeffects and preconditions, making them better suited for ROP attacks.

Author supplied keywords

Cite

CITATION STYLE

APA

Follner, A., Bartel, A., & Bodden, E. (2016). Analyzing the gadgets: Towards a metric to measure gadget quality. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9639, pp. 155–172). Springer Verlag. https://doi.org/10.1007/978-3-319-30806-7_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free