TY - GEN
T1 - A Framework for Automatic Exploit Generation for JIT Compilers
AU - Kang, Xiyu
AU - Debray, Saumya
N1 - Publisher Copyright:
© 2021 Owner/Author.
PY - 2021/11/19
Y1 - 2021/11/19
N2 - This paper proposes a framework for automatic exploit generation in JIT compilers, focusing in particular on heap corruption vulnerabilities triggered by dynamic code, i.e., code generated at runtime by the JIT compiler. The purpose is to help assess the severity of vulnerabilities and thereby assist with vulnerability triage. The framework consists of two components: the first extracts high-level representations of exploitation primitives from existing exploits, and the second uses the primitives so extracted to construct exploits for new bugs. We are currently building a prototype implementation of the framework focusing on JavaScript JIT compilers. To the best of our knowledge, this is the first proposal to consider automatic exploit generation for code generated dynamically by JIT compilers.
AB - This paper proposes a framework for automatic exploit generation in JIT compilers, focusing in particular on heap corruption vulnerabilities triggered by dynamic code, i.e., code generated at runtime by the JIT compiler. The purpose is to help assess the severity of vulnerabilities and thereby assist with vulnerability triage. The framework consists of two components: the first extracts high-level representations of exploitation primitives from existing exploits, and the second uses the primitives so extracted to construct exploits for new bugs. We are currently building a prototype implementation of the framework focusing on JavaScript JIT compilers. To the best of our knowledge, this is the first proposal to consider automatic exploit generation for code generated dynamically by JIT compilers.
KW - automatic exploit generation
KW - dynamic code
KW - jit compiler in javascript engines
UR - http://www.scopus.com/inward/record.url?scp=85121149264&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85121149264&partnerID=8YFLogxK
U2 - 10.1145/3465413.3488573
DO - 10.1145/3465413.3488573
M3 - Conference contribution
AN - SCOPUS:85121149264
T3 - CheckMate 2021 - Proceedings of the 2021 Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks, co-located with CCS 2021
SP - 11
EP - 19
BT - CheckMate 2021 - Proceedings of the 2021 Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks, co-located with CCS 2021
PB - Association for Computing Machinery, Inc
T2 - 2021 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks, CheckMate 2021
Y2 - 19 November 2021
ER -