BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks
2010; Springer Science+Business Media; Linguagem: Inglês
10.1007/978-3-642-11747-3_1
ISSN1611-3349
AutoresFrancesco Gadaleta, Yves Younan, Wouter Joosen,
Tópico(s)Web Application Security Vulnerabilities
ResumoWeb browsers that support a safe language such as Javascript are becoming a platform of great interest for security attacks. One such attack is a heap-spraying attack: a new kind of attack that combines the notoriously hard to reliably exploit heap-based buffer overflow with the use of an in-browser scripting language for improved reliability. A typical heap-spraying attack allocates a high number of objects containing the attacker's code on the heap, dramatically increasing the probability that the contents of one of these objects is executed. In this paper we present a lightweight approach that makes heap-spraying attacks in Javascript significantly harder. Our prototype, which is implemented in Firefox, has a negligible performance and memory overhead while effectively protecting against heap-spraying attacks.
Referência(s)