Back to Search
Start Over
RIM: A Method to Defend from JIT Spraying Attack
- Source :
- ARES
- Publication Year :
- 2012
- Publisher :
- IEEE, 2012.
-
Abstract
- As a code reuse technique, JIT spraying attack becomes popular on the JITed VM (Virtual Machine) (e.g., Javascript Engine, Flash Engine). Using a bug in web applications, an attacker can reuse the code generated by the JIT (Just-In-Time) compiler, which is used to optimize the performance of web applications. JIT spraying attacks can circumvent DEP and ASLR -- protection mechanisms of modern operating systems. Based on the observation that JIT spraying attack mostly uses the immediate operand of the arithmetic instruction to build a shellcode, we propose RIM, a technique that obfuscates the arithmetic operations in the JITed code and prevents attackers from reusing the native code to construct a malicious code. We implement a prototype on Tamarin flash engine and demonstrate the effectiveness of RIM. Experimental results show that RIM's overhead is very low (less than 1%). And RIM greatly improves the security functionality of JIT compilers.
Details
- Database :
- OpenAIRE
- Journal :
- 2012 Seventh International Conference on Availability, Reliability and Security
- Accession number :
- edsair.doi...........48ee617cdd09e1957f5f5226fe560ff8
- Full Text :
- https://doi.org/10.1109/ares.2012.11