Skip to Main Content
 

Global Search Box

 
 
 
 

ETD Abstract Container

Abstract Header

Verifying Data-Oriented Gadgets in Binary Programs to Build Data-Only Exploits

Abstract Details

2018, Master of Science (MS), Wright State University, Computer Science.
Data-Oriented Programming (DOP) is a data-only code-reuse exploit technique that “stitches” together sequences of instructions to alter a program’s data flow to cause harm. DOP attacks are difficult to mitigate because they respect the legitimate control flow of a program and by-pass memory protection schemes such as Address Space Layout Randomization, Data Execution Prevention, and Control Flow Integrity. Techniques that describe how to build DOP payloads rely on a program’s source code. This research explores the feasibility of constructing DOP exploits without source code—that is, using only binary representations of programs. The lack of semantic and type information introduces difficulties in identifying data-oriented gadgets and their properties. This research uses binary program analysis techniques and formal methods to identify and verify data-oriented gadgets, and determine if they are reachable and executable from a given memory corruption vulnerability. This information guides the construction of DOP attacks without the need for source code, showing that common-off-the-shelf programs are also vulnerable to this class of exploit.
Adam Bryant, Ph.D. (Committee Co-Chair)
John Emmert, Ph.D. (Committee Co-Chair)
Meilin Liu, Ph.D. (Committee Member)
Krishnaprasad Thirunarayan, Ph.D. (Committee Member)
70 p.

Recommended Citations

Citations

  • Sisco, Z. D. (2018). Verifying Data-Oriented Gadgets in Binary Programs to Build Data-Only Exploits [Master's thesis, Wright State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533308865314126

    APA Style (7th edition)

  • Sisco, Zachary. Verifying Data-Oriented Gadgets in Binary Programs to Build Data-Only Exploits. 2018. Wright State University, Master's thesis. OhioLINK Electronic Theses and Dissertations Center, http://rave.ohiolink.edu/etdc/view?acc_num=wright1533308865314126.

    MLA Style (8th edition)

  • Sisco, Zachary. "Verifying Data-Oriented Gadgets in Binary Programs to Build Data-Only Exploits." Master's thesis, Wright State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533308865314126

    Chicago Manual of Style (17th edition)