From Collision to Exploitation

Wen Xu,Juanru Li,Junliang Shu,Wenbo Yang,Tianyi Xie,Yuanyuan Zhang,Dawu Gu
DOI: https://doi.org/10.1145/2810103.2813637
2015-01-01
Abstract:Since vulnerabilities in Linux kernel are on the increase, attackers have turned their interests into related exploitation techniques. However, compared with numerous researches on exploiting use-after-free vulnerabilities in the user applications, few efforts studied how to exploit use-after-free vulnerabilities in Linux kernel due to the difficulties that mainly come from the uncertainty of the kernel memory layout. Without specific information leakage, attackers could only conduct a blind memory overwriting strategy trying to corrupt the critical part of the kernel, for which the success rate is negligible.
What problem does this paper attempt to address?