Back to Search Start Over

RIM: A Method to Defend from JIT Spraying Attack

Authors :
Li Xie
Rui Wu
Ping Chen
Bing Mao
Source :
ARES
Publication Year :
2012
Publisher :
IEEE, 2012.

Abstract

As a code reuse technique, JIT spraying attack becomes popular on the JITed VM (Virtual Machine) (e.g., Javascript Engine, Flash Engine). Using a bug in web applications, an attacker can reuse the code generated by the JIT (Just-In-Time) compiler, which is used to optimize the performance of web applications. JIT spraying attacks can circumvent DEP and ASLR -- protection mechanisms of modern operating systems. Based on the observation that JIT spraying attack mostly uses the immediate operand of the arithmetic instruction to build a shellcode, we propose RIM, a technique that obfuscates the arithmetic operations in the JITed code and prevents attackers from reusing the native code to construct a malicious code. We implement a prototype on Tamarin flash engine and demonstrate the effectiveness of RIM. Experimental results show that RIM's overhead is very low (less than 1%). And RIM greatly improves the security functionality of JIT compilers.

Details

Database :
OpenAIRE
Journal :
2012 Seventh International Conference on Availability, Reliability and Security
Accession number :
edsair.doi...........48ee617cdd09e1957f5f5226fe560ff8
Full Text :
https://doi.org/10.1109/ares.2012.11