About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_39,
        author={Tianning Zhang and Miao Cai and Diming Zhang and Hao Huang},
        title={eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Code reuse attack SROP Signal security},
        doi={10.1007/978-3-031-25538-0_39}
    }
    
  • Tianning Zhang
    Miao Cai
    Diming Zhang
    Hao Huang
    Year: 2023
    eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_39
Tianning Zhang1,*, Miao Cai2, Diming Zhang3, Hao Huang1
  • 1: Department of Computer Science and Technology
  • 2: State Key Laboratory for Novel Software Technology
  • 3: College of Computer Engineering
*Contact email: zhangtianning128@126.com

Abstract

Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provided by current operating systems and propose a new variant of SROP attack called enhanced SROP (eSROP) attack. eSROP provides the ability of invoking arbitrary system calls, simulating Turing-complete computation, and even bypassing the fine-grained label-based CFI defense, without modifying the return address and instruction register in the signal frame. Because the signal returns to the interrupted instruction, the shadow stack defense can hardly detect our attack. Signal has strong flexibility which can interrupt the normal control flow. We leverage such flexibility to design a new code reuse attack. To evaluate eSROP, we perform two exploits on two real-world programs, namely Proftpd and Wu-ftpd. In our attacks, adversaries can invoke arbitrary system calls and obtain a root shell. Both attacks succeed within 10 min under strict system defense such as data execution prevention, address space layout randomization, and coarse-grained control flow integrity.

Keywords
Code reuse attack SROP Signal security
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_39
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL