Back to Search
Start Over
Return-Oriented Rootkit without Returns (on the x86)
- Source :
- Information and Communications Security ISBN: 9783642176494, ICICS
- Publication Year :
- 2010
- Publisher :
- Springer Berlin Heidelberg, 2010.
-
Abstract
- Return Oriented Programming(ROP) is a new technique which can be leveraged to construct a rootkit by reusing the existing code within the kernel. Such ROP rootkit can be designed to evade existing kernel integrity protection mechanism. In this paper, we show that, it is also possible to mount a new type of return-oriented programming rootkit without using any return instructions on x86 platform. Our new attack makes use of certain instruction sequences ending in jmp instead of ret; we show that these sequences occur with sufficient frequency in OS kernel, thereby enabling to construct arbitrary x86 behaviors. Since it does not make use of return instructions, our new attack has negative implications for existing defense methods against traditional ROP attack. Further, we present a design of memory layout arrangement technique for this type of ROP rootkit, whose size is not limited by the kernel stack. Finally, we propose the implementation of this practical attack to demonstrate the feasibility and effectiveness of our approach.
Details
- ISBN :
- 978-3-642-17649-4
- ISBNs :
- 9783642176494
- Database :
- OpenAIRE
- Journal :
- Information and Communications Security ISBN: 9783642176494, ICICS
- Accession number :
- edsair.doi...........6e5acbdebbf80a799378dbf72fc98810
- Full Text :
- https://doi.org/10.1007/978-3-642-17650-0_24