|
|
Application Memory Authentication
D. Champagne, R. Elbaz, R. B. Lee
|
|
Application Memory Authentication (AMA) consists in verifying that what an
application reads from memory at a given address is what it last wrote
there. Modern operating systems typically cannot be trusted to enforce such
application memory space integrity, as exploitable software vulnerabilities
are commonly found in these large, complex and extendable
software systems. In this talk, we describe the problem of AMA and show,
through an attack we call branch splicing, that most common memory integrity
tree solutions cannot provide AMA. Finally, we describe and analyze major
problems that prevent, in practice, the deployment of the AMA mechanisms
proposed in the literature. |
|