مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

489
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

378
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

AGGRANDIZING THE BEAST'S LIMBS: PATULOUS CODE REUSE ATTACK ON ARM ARCHITECTURE

Pages

  39-52

Abstract

 Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as CODE REUSE ATTACK (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM ARCHITECTURE, we concentrate on available ARM-based CRAs. Currently, three types of CRAs are proposed on ARM ARCHITECTURE including Return2ZP, ROP, and BLX-attack in accordance to three sub-models available on X86. Ret2Libc, ROP, and JOP. In this paper, we have considered some unique aspects of ARM ARCHITECTURE to provide a general model for CODE REUSE ATTACKs called Patulous CODE REUSE ATTACK (PCRA). Our attack applies all available machine instructions that change Program Counter (PC) as well as direct or indirect branches in order to deploy the principles of CRA convention. We have demonstrated the effectiveness of our approach by defining five different sub-models of PCRA, explaining the algorithm of finding PCRA gadgets, introducing a useful set of gadgets, and providing a sample proof of concept exploit on ANDROID 4.4 platform.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    AMINMANSOUR, FARZANE, & SHAHRIARI, HAMID REZA. (2016). AGGRANDIZING THE BEAST'S LIMBS: PATULOUS CODE REUSE ATTACK ON ARM ARCHITECTURE. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 8(1 ), 39-52. SID. https://sid.ir/paper/241798/en

    Vancouver: Copy

    AMINMANSOUR FARZANE, SHAHRIARI HAMID REZA. AGGRANDIZING THE BEAST'S LIMBS: PATULOUS CODE REUSE ATTACK ON ARM ARCHITECTURE. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2016;8(1 ):39-52. Available from: https://sid.ir/paper/241798/en

    IEEE: Copy

    FARZANE AMINMANSOUR, and HAMID REZA SHAHRIARI, “AGGRANDIZING THE BEAST'S LIMBS: PATULOUS CODE REUSE ATTACK ON ARM ARCHITECTURE,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 8, no. 1 , pp. 39–52, 2016, [Online]. Available: https://sid.ir/paper/241798/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button