Code-Reuse Attacks : Automated Exploitation and Defense

Thesis topic details

General information

Organisation

The French Alternative Energies and Atomic Energy Commission (CEA) is a key player in research, development and innovation in four main areas :
• defence and security,
• nuclear energy (fission and fusion),
• technological research for industry,
• fundamental research in the physical sciences and life sciences.

Drawing on its widely acknowledged expertise, and thanks to its 16000 technicians, engineers, researchers and staff, the CEA actively participates in collaborative projects with a large number of academic and industrial partners.

The CEA is established in ten centers spread throughout France
  

Reference

SL-DRT-25-0015  

Direction

DRT

Thesis topic details

Category

Technological challenges

Thesis topics

Code-Reuse Attacks : Automated Exploitation and Defense

Contract

Thèse

Job description

Software vulnerabilities due to memory management errors are among the easiest to exploit. To prevent an attacker from injecting its own arbitrary code (shellcode), modern systems commonly enforce a Data Execution Prevention (DEP), often implemented as segment permissions (Write xor Execute – W^E).
Yet, Code-Reuse Attacks have emerged to circumvent the DEP protections. Thanks to a memory logic issue, the attacker hijacks the control flow of the target program and chains small code fragments referred to as gadgets to build the desired behavior, through so-called Return-Oriented Programming (ROP) or Jump-Oriented Programming (JOP).
In the past years, several research efforts have explored how to automate the construction of code reuse attacks from basic 'on stack' attacks, lowering the barrier to such advanced methods. On the other side, program hardening relies on randomized memory layout (e.g. Address Space Layout Randomization – ASLR), Control Flow Integrity (CFI) or stack protection mechanism (e.g. Shadow Stack) to keep the
attacker in check. Still, some of these protection may be costly (execution time, specialized hardware, etc.).

The general goal of this PhD topic is to improve the state of the art of the automatic exploit generation landscape for the purpose of security assessment of anti-code-reuse protection. We will follow two trend:
(1) on the one hand the candidate will push automated code-reuse automation methods, by taking into account the knowledge of the protection to guide the research to valid exploit only, prospectively cutting-off in the search space, and by looking for synergies between the ROP/JOP chaining and program synthesis methods such as syntax guided synthesis or stochastic synthesis methods;
(2) on the other hand, once the potential of such methods is better understood, the candidate will design effective defense against them, based on a comprehensive analysis of their main strengths and weaknesses.

University / doctoral school

Informatique - Automatique - Electronique - Electrotechnique - Mathématiques (IAEM)
Université de Lorraine

Thesis topic location

Site

Saclay

Requester

Position start date

01/10/2024

Person to be contacted by the applicant

RECOULES Frédéric frederic.recoules@cea.fr
CEA
DRT/DILS//LSL

Tutor / Responsible thesis director

MARION Jean-Yves Jean-Yves.Marion@loria.fr
LORIA
Laboratoire de Haute Sécurité
615, rue du Jardin Botanique
BP-101
54602 Villers-lès-Nancy
FRANCE
0383592030

En savoir plus



https://binsec.github.io