Using memory errors to attack a virtual machine

被引:76
作者
Govindavajhala, S [1 ]
Appel, AW [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
来源
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2003年
关键词
D O I
10.1109/SECPRI.2003.1199334
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on type-checking of untrusted programs as a protection mechanism. Our attack works by sending to the JVM a Java program that is designed so that almost any memory error in its address space will allow it to take control of the JVM. All conventional Java and .NET virtual machines are vulnerable to this attack. The technique of the attack is broadly applicable against other language-based security schemes such as proof-carrying code. We measured the attack on two commercial Java Virtual Machines: Sun's and IBM's. We show that a single-bit error in the Java program's data space can be exploited to execute arbitrary code with a probability of about 70%, and multiple-bit errors with a lower probability. Our attack is particularly relevant against smart cards or tamper-resistant computers, where the user has physical access (to the outside of the computer) and can use various means to induce faults; we have successfully used heat. Fortunately, there are some straightforward defenses against this attack.
引用
收藏
页码:154 / 165
页数:12
相关论文
共 21 条
  • [1] *ACT CORP, 2002, NEUTR SOFT ERR RAT
  • [2] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [3] ANDERSON R, 1997, IWSP INT WORKSH SEC
  • [4] Boneh Dan, 1997, LECT NOTES COMPUTER, V1233, P37, DOI DOI 10.1007/3-540-69053-0_
  • [5] BORMAN S, 2002, UNDERSTANDING IBM JA
  • [6] COLBY C, 2000, P 2000 ACM SIGPLAN C
  • [7] DEAN D, 1996, P 1996 IEEE S SEC PR
  • [8] Drossopoulou S., 1998, FORMAL SYNTAX SEMANT
  • [9] Drossopoulou S., 2000, JAVA TYPE SOUNDNESS
  • [10] McGraw G., 1999, SECURING JAVA