TY - GEN
T1 - No Free Lunch
T2 - 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023
AU - Zhang, Naiqian
AU - Alden, Daroc
AU - Xu, Dongpeng
AU - Wang, Shuai
AU - Jaeger, Trent
AU - Ruml, Wheeler
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Obfuscation has been widely employed to protect software from the malicious reverse analysis. However, its security risks have not previously been studied in detail. For example, most obfuscation methods introduce large blocks of opaque code that are black boxes to normal users. In this paper, we show that, indeed, obfuscation can increase the attack risk. Existing gadget search tools, while able to find more gadgets in obfuscated code, do not succeed in assembling them into more exploits. However, these tools use strict pattern matching, greedy searching strategies, and only very simple gadgets. We develop Gadget-Planner, a more flexible approach to building code-reuse attacks that overcomes previous limitations via symbolic execution and automated planning. In a study across both benchmark and real-world programs, this approach finds many more exploit payloads on obfuscated programs, both in terms of number and diversity.
AB - Obfuscation has been widely employed to protect software from the malicious reverse analysis. However, its security risks have not previously been studied in detail. For example, most obfuscation methods introduce large blocks of opaque code that are black boxes to normal users. In this paper, we show that, indeed, obfuscation can increase the attack risk. Existing gadget search tools, while able to find more gadgets in obfuscated code, do not succeed in assembling them into more exploits. However, these tools use strict pattern matching, greedy searching strategies, and only very simple gadgets. We develop Gadget-Planner, a more flexible approach to building code-reuse attacks that overcomes previous limitations via symbolic execution and automated planning. In a study across both benchmark and real-world programs, this approach finds many more exploit payloads on obfuscated programs, both in terms of number and diversity.
UR - https://www.scopus.com/pages/publications/85168998730
UR - https://www.scopus.com/pages/publications/85168998730#tab=citedBy
U2 - 10.1109/DSN58367.2023.00039
DO - 10.1109/DSN58367.2023.00039
M3 - Conference contribution
AN - SCOPUS:85168998730
T3 - Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023
SP - 313
EP - 326
BT - Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 27 June 2023 through 30 June 2023
ER -