COMRAcE: Detecting Data Race Vulnerabilities in COM Objects

PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM(2022)

引用 2|浏览9
暂无评分
摘要
The Microsoft Component Object Model (COM) is the foundation for many key Microsoft technologies and we develop COMRAcE, the first data race vulnerability detection tool for commercial off-the-shelf COM objects. COMRAcE targets a severe but previously overlooked flaw in the COM threading model, which makes COM objects prone to data race attacks. In COMRAcE, we apply static binary analyses to identify thread-unsafe interface methods in off-the-shelf COM binaries, then further verify binary analyses results with automatically synthesized proof-of-concept exploits (PoC). We have applied COMRAcE to 10,420 registered COM objects on the windows platform and the tool reports 186 vulnerable interface methods. COMRAcE automatically synthesizes 234 PoCs for 256 selected method pairs (82 unsafe methods) with conflict accesses, and there are 194 PoCs triggering race conditions. Furthermore, 145 PoCs lead to critical memory corruptions, exposing 26 vulnerabilities confirmed by the Common Vulnerabilities and Exposures (CVE) database.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要