Back to Search Start Over

Return-Oriented Rootkit without Returns (on the x86)

Authors :
Li Xie
Ping Chen
Bing Mao
Xiao Xing
Source :
Information and Communications Security ISBN: 9783642176494, ICICS
Publication Year :
2010
Publisher :
Springer Berlin Heidelberg, 2010.

Abstract

Return Oriented Programming(ROP) is a new technique which can be leveraged to construct a rootkit by reusing the existing code within the kernel. Such ROP rootkit can be designed to evade existing kernel integrity protection mechanism. In this paper, we show that, it is also possible to mount a new type of return-oriented programming rootkit without using any return instructions on x86 platform. Our new attack makes use of certain instruction sequences ending in jmp instead of ret; we show that these sequences occur with sufficient frequency in OS kernel, thereby enabling to construct arbitrary x86 behaviors. Since it does not make use of return instructions, our new attack has negative implications for existing defense methods against traditional ROP attack. Further, we present a design of memory layout arrangement technique for this type of ROP rootkit, whose size is not limited by the kernel stack. Finally, we propose the implementation of this practical attack to demonstrate the feasibility and effectiveness of our approach.

Details

ISBN :
978-3-642-17649-4
ISBNs :
9783642176494
Database :
OpenAIRE
Journal :
Information and Communications Security ISBN: 9783642176494, ICICS
Accession number :
edsair.doi...........6e5acbdebbf80a799378dbf72fc98810
Full Text :
https://doi.org/10.1007/978-3-642-17650-0_24