A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense

Sultan Aldossary, William Allen, Shengzhi Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The address space randomization technique was proposed to make determining the address of a shared library more difficult since each instance of the program is loaded into a random base address. However, when address space randomization layout (ASLR) is implemented on a 32-bit system, an attacker can use a brute force attack to guess the address of the shared library. The main goal of the research described in this paper is to study the use of a dispatching algorithm and multiple back-end servers as a moving target defense technique to mitigate ASLR weaknesses. First, we present a brute force attack when the number of servers is known. Second, we present a brute force attack when the number of servers is unknown. Last, we present the probability of the attacker's success on both of the attacks.

Original languageEnglish
Title of host publicationProceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017
EditorsFernando G. Tinetti, Quoc-Nam Tran, Leonidas Deligiannidis, Mary Qu Yang, Mary Qu Yang, Hamid R. Arabnia
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages61-67
Number of pages7
ISBN (Electronic)9781538626528
DOIs
StatePublished - 4 Dec 2018
Event2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017 - Las Vegas, United States
Duration: 14 Dec 201716 Dec 2017

Publication series

NameProceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017

Conference

Conference2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017
Country/TerritoryUnited States
CityLas Vegas
Period14/12/1716/12/17

Keywords

  • Buffer overflow attack

Fingerprint

Dive into the research topics of 'A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense'. Together they form a unique fingerprint.

Cite this