Matches in DBpedia 2015-10 for { <http://dbpedia.org/resource/JIT_spraying> ?p ?o }
Showing triples 1 to 45 of
45
with 100 triples per page.
- JIT_spraying abstract "JIT spraying is a class of computer security exploit that circumvents the protection of address space randomization (ASLR) and data execution prevention (DEP) by exploiting the behavior of just-in-time compilation. It has been reported to have been used to penetrate security features in the PDF format and Adobe's Flash technology.A just-in-time compiler (JIT) by definition produces code as its data. Since the purpose is to produce executable data, a JIT compiler is one of the few types of programs that cannot be run in a no-executable-data environment. Because of this, JIT compilers are normally exempt from data execution prevention. A JIT spray attack does heap spraying with the generated code.To produce exploit code from JIT, an idea from Dion Blazakis is used. The input program, typically JavaScript or ActionScript, typically contains numerous constant values that can be erroneously executed as code. For example, the XOR operation could be used:JIT then will transform bytecode to native x86 code like:0: b8 44 33 22 11 mov $0x11223344,%eax mov eax,0x112233445: 35 11 22 33 44 xor $0x44332211,%eax xor eax,0x44332211a: 35 11 22 33 44 xor $0x44332211,%eax xor eax,0x44332211The attacker then uses a suitable bug to redirect code execution into the newly generated code. For example, a buffer overflow or use after free bug could allow the attack to modify a function pointer or return address.This causes the CPU to execute instructions in a way that was unintended by the JIT authors. The attacker is usually not even limited to the expected instruction boundaries; it is possible to jump into the middle of an intended instruction to have the CPU interpret it as something else. As with non-JIT ROP attacks, this may be enough operations to usefully take control of the computer. Continuing the above example, jumping to the second byte of the "mov" instruction results in an "inc" instruction:1: 44 inc %esp inc esp2: 33 22 xor (%edx),%esp xor esp,DWORD PTR [edx]4: 11 35 11 22 33 44 adc %esi,0x44332211 adc DWORD PTR ds:0x44332211,esia: 35 11 22 33 44 xor $0x44332211,%eax xor eax,0x44332211Computer hardware that allows jumping into the middle of an instruction includes x86, x86-64, and ARM. Although especially effective on this type of hardware, JIT spraying works on other systems as well.To protect against JIT spraying, the JIT code can be disabled or made less predictable for the attacker.".
- JIT_spraying wikiPageID "30581850".
- JIT_spraying wikiPageLength "4185".
- JIT_spraying wikiPageOutDegree "19".
- JIT_spraying wikiPageRevisionID "623509809".
- JIT_spraying wikiPageWikiLink ARM_architecture.
- JIT_spraying wikiPageWikiLink ActionScript.
- JIT_spraying wikiPageWikiLink Address_space_layout_randomization.
- JIT_spraying wikiPageWikiLink Address_space_randomization.
- JIT_spraying wikiPageWikiLink Adobe_Flash.
- JIT_spraying wikiPageWikiLink Buffer_overflow.
- JIT_spraying wikiPageWikiLink Category:Computer_security_exploits.
- JIT_spraying wikiPageWikiLink Computer_security_exploit.
- JIT_spraying wikiPageWikiLink Dangling_pointer.
- JIT_spraying wikiPageWikiLink Data_Execution_Prevention.
- JIT_spraying wikiPageWikiLink Data_execution_prevention.
- JIT_spraying wikiPageWikiLink Exclusive_or.
- JIT_spraying wikiPageWikiLink Exploit_(computer_security).
- JIT_spraying wikiPageWikiLink Function_pointer.
- JIT_spraying wikiPageWikiLink Heap_spraying.
- JIT_spraying wikiPageWikiLink JavaScript.
- JIT_spraying wikiPageWikiLink Just-in-time_compilation.
- JIT_spraying wikiPageWikiLink Just-in-time_compiler.
- JIT_spraying wikiPageWikiLink PDF.
- JIT_spraying wikiPageWikiLink Portable_Document_Format.
- JIT_spraying wikiPageWikiLink Return-oriented_programming.
- JIT_spraying wikiPageWikiLink Use_after_free.
- JIT_spraying wikiPageWikiLink X86.
- JIT_spraying wikiPageWikiLink X86-64.
- JIT_spraying wikiPageWikiLinkText "JIT spraying".
- JIT_spraying hasPhotoCollection JIT_spraying.
- JIT_spraying wikiPageUsesTemplate Template:Computer-security-stub.
- JIT_spraying wikiPageUsesTemplate Template:Reflist.
- JIT_spraying wikiPageUsesTemplate Template:Use_dmy_dates.
- JIT_spraying subject Category:Computer_security_exploits.
- JIT_spraying hypernym Security.
- JIT_spraying type Organisation.
- JIT_spraying type Exploit.
- JIT_spraying comment "JIT spraying is a class of computer security exploit that circumvents the protection of address space randomization (ASLR) and data execution prevention (DEP) by exploiting the behavior of just-in-time compilation. It has been reported to have been used to penetrate security features in the PDF format and Adobe's Flash technology.A just-in-time compiler (JIT) by definition produces code as its data.".
- JIT_spraying label "JIT spraying".
- JIT_spraying sameAs m.0g9wdrz.
- JIT_spraying sameAs Q6108270.
- JIT_spraying sameAs Q6108270.
- JIT_spraying wasDerivedFrom JIT_spraying?oldid=623509809.
- JIT_spraying isPrimaryTopicOf JIT_spraying.