Computer Science ›› 2022, Vol. 49 ›› Issue (11): 49-54.doi: 10.11896/jsjkx.210900230

• Computer Software • Previous Articles     Next Articles

Semantic Restoration and Automatic Transplant for ROP Exploit Script

SHI Rui-heng, ZHU Yun-cong, ZHAO Yi-ru, ZHAO Lei   

  1. Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Cyber Science and Engineering, Wuhan University,Wuhan 430072,China
  • Received:2021-09-27 Revised:2022-03-26 Online:2022-11-15 Published:2022-11-03
  • About author:SHI Rui-heng,born in 1997,postgra-duate.His main research interests include automatic exploit generation and fuzzing.
    ZHAO Lei,born in 1985,Ph.D,professor.His main research interests include software and system security,especially in security analysis of binary programs and automatic software vulnerability detection.
  • Supported by:
    National Natural Science Foundation of China(62172305,U1836112) and Key-Area Research and Development Program of Hubei Province(2020BAA003).

Abstract: Exploit script plays an important role in security research.Security researchers need to study how the exploit script trigger and exploit the vulnerability,so as to effectively protect the vulnerable program.However,many exploit scripts obtained from network have poor generality and adaptability.They are limited to specific operating system and execution environment,and the change of environment will lead to execution failure.This problem is particular common in exploit scripts based on return-orinted programming(ROP),makes the transplanting and exploit analysis of ROP scripts are difficult and rely on manual assistance and expert knowledge.To solve this problem,we propose ROPTrans system,which locates key semantics and its variables related to the running environment through analysing the semantic of ROP script,and then automatically generates ROP script adapted to the target environment,so as to achieve the target of transplanting ROP scripts automatically.Experimental results show that the success rate of ROPTrans can reach up to 80%,which verifies the effectiveness of our method.

Key words: Exploit script, Control flow hijack, Return-orinted Programming, Transplanting

CLC Number: 

  • TP399
[1]ARCE I.The shellcode generation[J].IEEE Security & Privacy,2004,2(5):72-76.
[2]ROEMER R,BUCHANAN E,SHACHAM H,et al.Return-oriented programming:Systems,languages,and applications[J].ACM Transactions on Information and System Security(TISSEC),2012,15(1):1-34.
[3]VISHNYAKOV A V,NURMUKHAMETOV A R.Survey ofMethods for Automated Code-Reuse Exploit Generation[J].Programming and Computer Software,2021,47(4):271-297.
[4]BUCHANAN E,ROEMER R,SHACHAM H,et al.When good instructions go bad:Generalizing return-oriented programming to RISC[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security.2008:27-38.
[5]BAO T,WANG R,SHOSHITAISHVILI Y,et al.Your exploit is mine:Automatic Shellcode transplant for remote exploits[C]//2017 IEEE Symposium on Security and Privacy(SP).IEEE,2017:824-839.
[6]NEWSOME J,SONG D X.Dynamic Taint Analysis for Auto-matic Detection,Analysis,and Signature Generation of Exploits on Commodity Software[C]//NDSS.2005:3-4.
[7]KANG M G,MCCAMANT S,POOSANKAM P,et al.Dta++:dynamic taint analysis with targeted control-flow propagation[C]//NDSS.2011.
[8]CHARNIAK E.Tree-bank grammars[C]//Proceedings of the National Conference on Artificial Intelligence.1996:1031-1036.
[9]YOU W,ZONG P,CHEN K,et al.Semfuzz:Semantics-basedautomatic generation of proof-of-concept exploits[C]//Procee-dings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.2017:2139-2154.
[10]CHOWDHARY K R.Natural language processing[M]//Fundamentals of Artificial Intelligence.New Delhi:Springer,2020:603-649.
[11]LAM M S,MARTIN M,LIVSHITS B,et al.Securing web applications with static and dynamic information flow tracking[C]//Proceedings of the 2008 ACM SIGPLAN symposium on Partial Evaluation and Semantics-based Program Manipulation.2008:3-12.
[1] HAN Xiao, ZHANG Zhe-qing, YAN Li. Temporal RDF Modeling Based on Relational Database [J]. Computer Science, 2022, 49(11): 90-97.
[2] SHI Kun, ZHOU Yong, ZHANG Qi-liang, JIANG Shun-rong. Privacy-preserving Scheme of Energy Trading Data Based on Consortium Blockchain [J]. Computer Science, 2022, 49(11): 335-344.
[3] CHENG Wen, LI Yan, ZENG Ling-fang, WANG Fang, TANG Shi-cheng, YANG Li-ping, FENG Dan, ZENG Wen-jun. Error Log Analysis and System Optimization for Lustre Cluster Storage [J]. Computer Science, 2022, 49(10): 1-9.
[4] LI Yi-cong, ZHOU Kuan-jiu, WANG Zi-zhong, XU Lin. ZKFERP:Universal and Efficient Range Proof Scheme with Constant Computational Cost [J]. Computer Science, 2022, 49(10): 335-343.
[5] HU Yu-jiao, JIA Qing-min, SUN Qing-shuang, XIE Ren-chao, HUANG Tao. Functional Architecture to Intelligent Computing Power Network [J]. Computer Science, 2022, 49(9): 249-259.
[6] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
[7] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[8] LIU Li, LI Ren-fa. Control Strategy Optimization of Medical CPS Cooperative Network [J]. Computer Science, 2022, 49(6A): 39-43.
[9] SHEN Chao, HE Xi-ping. Face Anti-spoofing Algorithm Based on Texture Feature Enhancement and Light Neural Network [J]. Computer Science, 2022, 49(6A): 390-396.
[10] LIU Yun, DONG Shou-jie. Acceleration Algorithm of Multi-channel Video Image Stitching Based on CUDA Kernel Function [J]. Computer Science, 2022, 49(6A): 441-446.
[11] ZHU Xu-hui, SHEN Guo-jiao, XIA Ping-fan, NI Zhi-wei. Model Based on Spirally Evolution Glowworm Swarm Optimization and Back Propagation Neural Network and Its Application in PPP Financing Risk Prediction [J]. Computer Science, 2022, 49(6A): 667-674.
[12] YANG Xiao-yu, YIN Kang-ning, HOU Shao-qi, DU Wen-yi, YIN Guang-qiang. Person Re-identification Based on Feature Location and Fusion [J]. Computer Science, 2022, 49(3): 170-178.
[13] CHEN Gui-qiang, HE Jun. Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene [J]. Computer Science, 2022, 49(2): 116-122.
[14] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[15] LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong. CFL_BLP_BC Model Based on Authentication and Blockchain [J]. Computer Science, 2021, 48(11): 36-45.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!