Stack Layout Randomization with Minimal Rewriting of Android Binaries

  • Yu LIANG
  • , Xinjie MA
  • , Daoyuan WU
  • , Xiaoxiao TANG
  • , Debin GAO
  • , Guojun PENG*
  • , Chunfu JIA
  • , Huanguo ZHANG
  • *Corresponding author for this work

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

7 Citations (Scopus)

Abstract

Stack-based attacks typically require that attackers have a good understanding of the stack layout of the victim program. In this paper, we leverage specific features on ARM architecture and propose a practical technique that introduces randomness to the stack layout when an Android application executes. We employ minimal binary rewriting on the Android app that produces randomized executable of the same size which can be executed on an unmodified Android operating system. Our experiments on applying this randomization on the most popular 20 free Android apps on Google Play show that the randomization coverage of functions increases from 65% (by a state-of-the-art randomization approach) to 97.6% with, on average, 4 and 7 bits of randomness applied to each 16-bit and 32-bit function, respectively. We also show that it is effective in defending against stack-based memory vulnerabilities and real-world ROP attacks.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers
EditorsSoonhak KWON, Aaram YUN
PublisherSpringer, Cham
Pages229-245
Number of pages17
ISBN (Electronic)9783319308401
ISBN (Print)9783319308395
DOIs
Publication statusPublished - 10 Mar 2016
Externally publishedYes
Event18th International Conference on Information Security and Cryptology - Seoul, Korea, Republic of
Duration: 25 Nov 201527 Nov 2015

Publication series

NameLecture Notes in Computer Science
Volume9558
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Information Security and Cryptology
Abbreviated titleICISC 2015
Country/TerritoryKorea, Republic of
CitySeoul
Period25/11/1527/11/15

Bibliographical note

Publisher Copyright:
© Springer International Publishing Switzerland 2016.

Funding

This research was partially supported by the National Science Foundation of China (Grant No. 61202387, 61332019, and 61373168) and the National Key Basic Research Program of China (Grant No. 2014CB340600).

Keywords

  • Android security
  • Memory layout randomization

Fingerprint

Dive into the research topics of 'Stack Layout Randomization with Minimal Rewriting of Android Binaries'. Together they form a unique fingerprint.

Cite this