Effective Memory Diversification in Legacy Systems

Authors

DOI:

https://doi.org/10.32985/ijeces.14.3.10

Keywords:

Legacy System, Diversification, Memory Layout Randomization, UAV Firmware

Abstract

Memory corruption error is one of the critical security attack vectors against a wide range of software. Addressing this problem, modern compilers provide multiple features to fortify the software against such errors. However, applying compiler-based memory defense is problematic in legacy systems we often encounter in industry or military environments because source codes are unavailable. In this study, we propose memory diversification techniques tailored for legacy binaries to which we cannot apply state-of- the-art compiler-based solutions. The basic idea of our approach is to automatically patch the machine code instructions of each legacy system differently (e.g., a drone, or a vehicle firmware) without altering any semantic behavior of the software logic. As a result of our system, attackers must create a specific attack payload for each target by analyzing the particular firmware, thus significantly increasing exploit development time and cost. Our approach is evaluated by applying it to a stack and heap of multiple binaries, including PX4 drone firmware and other Linux utilities.

Downloads

Published

2023-03-28

How to Cite

[1]
H. Yun and D. Jang, “Effective Memory Diversification in Legacy Systems”, IJECES, vol. 14, no. 3, pp. 321-331, Mar. 2023.

Issue

Section

Original Scientific Papers