메뉴 건너뛰기




Volumn 48, Issue 4, 2013, Pages 253-263

Iago attacks: Why the system call API is a bad untrusted rpc interface

Author keywords

Iago attacks; Overshadow; System call

Indexed keywords

IAGO ATTACKS; LINUX SYSTEMS; OVERSHADOW; PROTECTION MECHANISMS; RETURN VALUE; SYSTEM CALLS; TRUSTED APPLICATIONS;

EID: 84880119749     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/2499368.2451145     Document Type: Conference Paper
Times cited : (102)

References (29)
  • 1
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free()
    • Anonymous, August
    • Anonymous. Once upon a free(). . . . Phrack Magazine, 57(9), August 2001. http://www.phrack.org/archives/57/p57-0x09-Once%20upon%20a%20free()-by- anonymous%20author.txt.
    • (2001) Phrack Magazine , vol.57 , Issue.9
  • 3
    • 84880094333 scopus 로고    scopus 로고
    • Malloc des-maleficarum
    • blackngel, November
    • blackngel. Malloc des-maleficarum. Phrack Magazine, 66(10), November 2009. http://www.phrack.org/archives/66/p66-0x0a-Malloc%20Des-Maleficarum-by- blackngel.txt.
    • (2009) Phrack Magazine , vol.66 , Issue.10
  • 4
    • 84880088171 scopus 로고    scopus 로고
    • Blackngel. ptmalloc v2 & v3: Analysis & corruption
    • November
    • blackngel. ptmalloc v2 & v3: Analysis & corruption. Phrack Magazine, 67(8), November 2010. http://www.phrack.org/archives/67/p67-0x08- The%20House%20Of%20Lore:%20Reloaded%20ptmalloc%20v2%20&%20v3: %20Analysis%20&%20Corruption-by-blackngel.txt.
    • (2010) Phrack Magazine , vol.67 , Issue.8
  • 5
    • 84861443711 scopus 로고    scopus 로고
    • Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage
    • David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, August
    • Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/ IAVoSS, August 2009.
    • (2009) Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/ IAVoSS
    • Checkoway, S.1    Feldman, A.J.2    Kantor, B.3    Alex Halderman, J.4    Felten, E.W.5    Shacham, H.6
  • 6
    • 77957810674 scopus 로고    scopus 로고
    • Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
    • James Larus, editor, ACM Press, March
    • Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R.K. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In James Larus, editor, Proceedings of ASPLOS 2008, pages 2-13. ACM Press, March 2008.
    • (2008) Proceedings of ASPLOS 2008 , pp. 2-13
    • Chen, X.1    Garfinkel, T.2    Lewis, E.C.3    Subrahmanyam, P.4    Waldspurger, C.A.5    Boneh, D.6    Dwoskin, J.7    Ports, D.R.K.8
  • 8
    • 84883516225 scopus 로고
    • Exokernel: An operating system architecture for application-level resource management
    • ACM Press, December
    • Dawson R. Engler, M. Frans Kaashoek, and James W. O'Toole. Exokernel: An operating system architecture for application-level resource management,. In Mark Weiser, editor, Proceedings of SOSP 1995, pages 251-66. ACM Press, December 1995.
    • (1995) Mark Weiser, Editor, Proceedings of SOSP 1995 , pp. 251-66
    • Engler, D.R.1    Frans Kaashoek, M.2    O'toole, J.W.3
  • 9
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in system call interposition based security tools
    • Virgil Gligor and Mike Reiter, editors, Internet Society, February
    • Tal Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In Virgil Gligor and Mike Reiter, editors, Proceedings of NDSS 2003. Internet Society, February 2003.
    • (2003) Proceedings of NDSS 2003
    • Garfinkel, T.1
  • 10
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A delegating architecture for secure system call interposition
    • Mike Reiter and Dan Boneh, editors, Internet Society, February
    • Tal Garfinkel, Ben Pfaff, and Mendel Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Mike Reiter and Dan Boneh, editors, Proceedings of NDSS 2004. Internet Society, February 2004.
    • (2004) Proceedings of NDSS 2004
    • Garfinkel, T.1    Pfaff, B.2    Rosenblum, M.3
  • 12
    • 85031663471 scopus 로고
    • Moving the default memory manager out of the mach kernel
    • Alan Langerman, editor, November, USENIX
    • David B. Golub and Richard P. Draves. Moving the default memory manager out of the mach kernel. In Alan Langerman, editor, Proceedings of Mach Symposium 1991, pages 177-88, November, 1991. USENIX.
    • (1991) Proceedings of Mach Symposium 1991 , pp. 177-88
    • Golub, D.B.1    Draves, R.P.2
  • 13
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • August
    • Michel Kaempf. Vudo malloc tricks. Phrack Magazine, 57(8), August 2001. http://www.phrack.org/archives/57/p57-0x08-Vudo%20malloc%20tricks-by-MaXX.txt.
    • (2001) Phrack Magazine , vol.57 , Issue.8
    • Kaempf, M.1
  • 14
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • Larry Peterson, editor, ACM Press, October
    • David Lie, Chandramohan Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In Larry Peterson, editor, Proceedings of SOSP 2003, pages 178-92. ACM Press, October 2003.
    • (2003) Proceedings of SOSP 2003 , pp. 178-92
    • Lie, D.1    Thekkath, C.2    Horowitz, M.3
  • 15
    • 34548722186 scopus 로고    scopus 로고
    • Minimal tcb code execution (extended abstract)
    • Birgit Pfitzmann and Patrick McDaniel, editors, IEEE Computer Society, May
    • Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. Minimal tcb code execution (extended abstract). In Birgit Pfitzmann and Patrick McDaniel, editors, Proceedings of IEEE Security & Privacy ("Oakland") 2007, pages 267-72. IEEE Computer Society, May 2007.
    • (2007) Proceedings of IEEE Security & Privacy ("Oakland") 2007 , pp. 267-72
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Seshadri, A.5
  • 16
    • 77957778583 scopus 로고    scopus 로고
    • How low can you go? recommendations for hardware-supported minimal tcb code execution
    • James Larus, editor, ACM Press, March
    • Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. How low can you go? Recommendations for hardware-supported minimal TCB code execution. In James Larus, editor, Proceedings of ASPLOS 2008, pages 14-25. ACM Press, March 2008.
    • (2008) Proceedings of ASPLOS 2008 , pp. 14-25
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Seshadri, A.5
  • 17
    • 55149108173 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for tcb minimization
    • Steven Hand, editor, ACM, March
    • Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. Flicker: An execution infrastructure for TCB minimization. In Steven Hand, editor, Proceedings of EuroSys 2008, pages 315-28. ACM Press, March 2008.
    • (2008) Proceedings of EuroSys 2008 , pp. 315-28
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Seshadri, A.5
  • 18
    • 78650861686 scopus 로고    scopus 로고
    • Safe passage for passwords and other sensitive data
    • Giovanni Vigna, editor, The Internet Society, February
    • Jonathan M. McCune, Adrian Perrig, and Michael K. Reiter. Safe passage for passwords and other sensitive data. In Giovanni Vigna, editor, Proceedings of NDSS 2009. The Internet Society, February 2009.
    • (2009) Proceedings of NDSS 2009
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 19
    • 78650032754 scopus 로고    scopus 로고
    • Dieharder: Securing the heap
    • Angelos D. Keromytis and Vitaly Shmatikov, editors, ACM Press, October
    • Gene Novark and Emery D. Berger. DieHarder: Securing the heap. In Angelos D. Keromytis and Vitaly Shmatikov, editors, Proceedings of CCS 2010. ACM Press, October 2010.
    • (2010) Proceedings of CCS 2010
    • Novark, G.1    Berger, E.D.2
  • 20
    • 84880119690 scopus 로고    scopus 로고
    • The stack is back
    • Presented at, January, Presentation. Slides
    • Jon Oberheide. The stack is back. Presented at Infiltrate 2012, January 2012. Presentation. Slides: http://jon.oberheide.org/files/infiltrate12- thestackisback.pdf.
    • (2012) Infiltrate 2012
    • Oberheide, J.1
  • 24
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Vern Paxson, editor, USENIX, August
    • Niels Provos. Improving host security with system call policies. In Vern Paxson, editor, Proceedings of USENIX Security 2003. USENIX, August 2003.
    • (2003) Proceedings of USENIX Security 2003
    • Provos, N.1
  • 26
    • 84875677480 scopus 로고    scopus 로고
    • When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography
    • Wenke Lee, editor, Internet Society, February
    • Thomas Ristenpart and Scott Yilek. When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. InWenke Lee, editor, Proceedings of NDSS 2003. Internet Society, February 2003.
    • (2003) Proceedings of NDSS 2003
    • Ristenpart, T.1    Yilek, S.2
  • 27
    • 84859457954 scopus 로고    scopus 로고
    • Return-oriented programming: Systems, languages, and applications
    • To appear
    • Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage. Return-oriented programming: Systems, languages, and applications. Trans. Info. & Sys. Sec., 2012. To appear.
    • (2012) Trans. Info. & Sys. Sec.
    • Roemer, R.1    Buchanan, E.2    Shacham, H.3    Savage, S.4
  • 28
    • 78650018752 scopus 로고    scopus 로고
    • Bypassing browser memory protections in windows vista
    • Presented at, August, Online
    • Alexander Sotirov and Mark Dowd. Bypassing browser memory protections in Windows Vista. Presented at Black Hat 2008, August 2008. Online: http://www.phreedom.org/research/bypassingbrowser-memory-protections/ bypassing-browsermemory-protections.pdf.
    • (2008) Black Hat 2008
    • Sotirov, A.1    Dowd, M.2
  • 29
    • 84877725095 scopus 로고    scopus 로고
    • When private keys are public: Results from the 2008 debian openssl vulnerability
    • Anja Feldmann and Laurent Mathy, editors, ACM, November
    • Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage. When private keys are public: Results from the 2008 Debian OpenSSL vulnerability. In Anja Feldmann and Laurent Mathy, editors, Proceedings of IMC 2009, pages 15-27. ACM Press, November 2009.
    • (2009) Proceedings of IMC 2009 , pp. 15-27
    • Yilek, S.1    Rescorla, E.2    Shacham, H.3    Enright, B.4    Savage, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.