PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique

  • Yoochan Lee
  • , Jinhan Kwak
  • , Junesoo Kang
  • , Yuseok Jeon*
  • , Byoungyoung Lee*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The stealthiness of an attack is the most vital consideration for an attacker to reach their goals without being detected. Therefore, attackers put in a great deal of effort to increase the success rate of attacks in order not to expose information on the attacker and attack attempts resulting from failures. Exploitation of the kernel, which is a prime target for the attacker, usually takes advantage of heap-based vulnerabilities, and these exploits’ success rates fortunately remain low (e.g., 56.1% on average) due to the operating principle of the default Linux kernel heap allocator, SLUB. This paper presents PSPRAY, a timing side-channel attack-based exploitation technique that significantly increases the success probability of exploitation. According to our evaluation, with 10 real-world vulnerabilities, PSPRAY significantly improves the success rate of all those vulnerabilities (e.g., from 56.1% to 97.92% on average). To prevent this exploitation technique from being abused by the attacker, we further introduce a new defense mechanism to mitigate the threat of PSPRAY. After applying mitigation, the overall success rate of PSPRAY becomes similar to that from before using PSPRAY with negligible performance overhead (0.25%) and memory overhead (0.52%).

Original languageEnglish
Title of host publication32nd USENIX Security Symposium, USENIX Security 2023
PublisherUSENIX Association
Pages6825-6842
Number of pages18
ISBN (Electronic)9781713879497
Publication statusPublished - 2023
Externally publishedYes
Event32nd USENIX Security Symposium, USENIX Security 2023 - Anaheim, United States
Duration: 2023 Aug 92023 Aug 11

Publication series

Name32nd USENIX Security Symposium, USENIX Security 2023
Volume10

Conference

Conference32nd USENIX Security Symposium, USENIX Security 2023
Country/TerritoryUnited States
CityAnaheim
Period23/8/923/8/11

Bibliographical note

Publisher Copyright:
© 32nd USENIX Security Symposium, USENIX Security 2023. All rights reserved

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique'. Together they form a unique fingerprint.

Cite this