Abstract | ||
---|---|---|
Spraying is a common payload delivery technique used by attackers to execute arbitrary code in presence of Address Space Layout Randomisation (ASLR). In this paper we present Graffiti, an efficient hypervisor-based memory analysis framework for the detection and prevention of spraying attacks. Compared with previous solutions, our system is the first to offer an efficient, complete, extensible, and OS independent protection against all spraying techniques known to date. We developed a prototype open source framework based on our approach, and we thoroughly evaluated it against all known variations of spraying attacks on two operating systems: Linux and Microsoft Windows. Our tool can be applied out of the box to protect any application, and its overhead can be tuned according to the application behavior and to the desired level of protection. |
Year | Venue | Field |
---|---|---|
2016 | PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM | Graffiti,Address space,Virtualization,Microsoft Windows,Computer science,Computer security,Simulation,Memory analysis,Extensibility,Tracing,Operating system,Payload |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Stefano Cristalli | 1 | 0 | 1.35 |
Mattia Pagnozzi | 2 | 1 | 0.96 |
Mariano Graziano | 3 | 40 | 5.30 |
Andrea Lanzi | 4 | 845 | 40.99 |
Davide Balzarotti | 5 | 2040 | 113.64 |