Back to Search Start Over

Lobotomy: An Architecture for JIT Spraying Mitigation

Authors :
Martin Jauernig
Matthias Neugschwandtner
Christian Platzer
Paolo Milani Comparetti
Source :
ARES
Publication Year :
2014
Publisher :
IEEE, 2014.

Abstract

JIT spraying has an assured spot in an attacker's toolkit for Web browser exploitation: With JIT spraying an attacker is able to circumvent even the most sophisticated defense strategies against code injection, including address space layout randomization (ASLR), data execution prevention (DEP) and stack canaries. In this paper, we present Lobotomy, an architecture for building injection-safe JIT engines. Lobotomy is secure by design: it separates compiler and executor of a JIT engine in different processes that share the memory regions containing the compiled code. This allows us to use least-privilege access rights for both processes, preventing memory regions to be mapped with write- and execute-rights at the same time. Our proof-of-concept implementation that modifies the well-known Fire fox JIT engine Trace monkey shows both the effectiveness and real-world feasibility of our architecture. Additionally, we provide a thorough evaluation of our version compared to an unmodified baseline and competing approaches.

Details

Database :
OpenAIRE
Journal :
2014 Ninth International Conference on Availability, Reliability and Security
Accession number :
edsair.doi...........ef824fb8454052c506cd1e4fd32d3ecf
Full Text :
https://doi.org/10.1109/ares.2014.14