Zhixiao Zhang 张志孝

SoK: Eternal War in Memory

Authors: László Szekeres, Mathias Payer, Tao Wei, Dawn Song

Category: SoK

Keywords: security, memory safety

What problem does this paper survey?

Why do exploits still exist?

How they defeat currently deployed protections?

How to defeat them?

Questions asked by this paper

  1. How do exploits work?

attack-model

Q: Why is reading from a pointer under the attacker’s control vulnerable?

A: Because the attacker can control the value being read, for example, an ROP gadget.

  1. How to protect against exploits?

The most widely deployed protection mechanisms are stack smashing protection, DEP/W⊕X and ASLR.

  1. Why or why not is a policy being deployed?
  1. What’s the popular work in different perspective of memory war?

What are the strengths of this paper?

A systematic and graphic model of all layers of memory corruption mechanism and defenses

What are the limitations and weaknesses of this paper?

Without a same metric for shown approaches. Only use the data derived from the original paper.

What makes this paper publishable?

The systematic classification and illustration.

What are other solutions and what are the most relevant works?

SoK: Sanitizing for Security

Thing(s) that I like particularly about this paper.

the clear graph

What is the take-away message from this paper?

Researchers have to step back, and instead of focusing on specific attacks, we need to look at the big picture.