File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

전유석

Jeon, Yuseok
Secure Software Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace US -
dc.citation.endPage 6842 -
dc.citation.startPage 6825 -
dc.citation.title USENIX Security Symposium -
dc.contributor.author Lee, Yoochan -
dc.contributor.author Kwak, Jinhan -
dc.contributor.author Kang, Junesoo -
dc.contributor.author Jeon, Yuseok -
dc.contributor.author Lee, Byoungyoung -
dc.date.accessioned 2024-01-31T18:36:55Z -
dc.date.available 2024-01-31T18:36:55Z -
dc.date.created 2023-12-15 -
dc.date.issued 2023-08-09 -
dc.description.abstract The stealthiness of an attack is the most vital consideration for an attacker to reach their goals without being detected. Therefore, attackers put in a great deal of effort to increase the success rate of attacks in order not to expose information on the attacker and attack attempts resulting from failures. Exploitation of the kernel, which is a prime target for the attacker, usually takes advantage of heap-based vulnerabilities, and these exploits’ success rates fortunately remain low (e.g., 56.1% on average) due to the operating principle of the default Linux kernel heap allocator, SLUB. This paper presents PSPRAY, a timing side-channel attack-based exploitation technique that significantly increases the success probability of exploitation. According to our evaluation, with 10 real-world vulnerabilities, PSPRAY significantly improves the success rate of all those vulnerabilities (e.g., from 56.1% to 97.92% on average). To prevent this exploitation technique from being abused by the attacker, we further introduce a new defense mechanism to mitigate the threat of PSPRAY. After applying mitigation, the overall success rate of PSPRAY becomes similar to that from before using PSPRAY with negligible performance overhead (0.25%) and memory overhead (0.52%). -
dc.identifier.bibliographicCitation USENIX Security Symposium, pp.6825 - 6842 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/74622 -
dc.identifier.url https://dl.acm.org/doi/10.5555/3620237.3620619 -
dc.language 영어 -
dc.publisher USENIX Association -
dc.title PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique -
dc.type Conference Paper -
dc.date.conferenceDate 2023-08-09 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.