Title
Sleak: automating address space layout derandomization
Abstract
We present a novel approach to automatically recover information about the address space layout of remote processes in the presence of Address Space Layout Randomization (ASLR). Our system, dubbed Sleak, performs static analysis and symbolic execution of binary executable programs, and identifies program paths and input parameters leading to partial (i.e., only a few bits) or complete (i.e., the whole address) information disclosure vulnerabilities, revealing addresses of known objects of the target service or application. Sleak takes, as input, the binary executable program, and generates a symbolic expression for each program output that leaks information about the addresses of objects, such as stack variables, heap structures, or function pointers. By comparing these expressions with the concrete output of a remote process executing the same binary program image, our system is able to recover from a few bits to whole addresses of objects of the target application or service. Discovering the address of a single object in the target application is often enough to guess the layout of entire sections of the address space, which can be leveraged by attackers to bypass ASLR.
Year
DOI
Venue
2019
10.1145/3359789.3359820
Proceedings of the 35th Annual Computer Security Applications Conference
Keywords
Field
DocType
binary program analysis, information leakage, vulnerability discovery
Address space,Software engineering,Computer science,Computer security
Conference
ISBN
Citations 
PageRank 
978-1-4503-7628-0
1
0.38
References 
Authors
0
6
Name
Order
Citations
PageRank
Christophe Hauser110.38
Jayakrishna Menon210.38
Yan Shoshitaishvili335826.98
Ruoyu Wang428216.23
Giovanni Vigna57121507.72
Christopher Kruegel68799516.05