An In-Lined Monitoring Approach to Flash App Security
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Topology-Adaptive Overlay Framework. (Under the Direction of Dr
ABSTRACT KANDEKAR, KUNAL. TAO: A Topology-Adaptive Overlay Framework. (Under the direction of Dr. Khaled Harfoush.) Large-scale distributed systems rely on constructing overlay networks in which nodes communicate with each other through intermediate overlay neighbors. Organizing nodes in the overlay while preserving its congruence with the underlying IP topology (the underlay) is important to reduce the communication cost between nodes. In this thesis, we study the state- of-the-art approaches to match the overlay and underlay topologies and pinpoint their limitations in Internet-like setups. We also introduce a new Topology-Adaptive Overlay organization framework, TAO, which is scalable, accurate and lightweight. As opposed to earlier approaches, TAO compiles information resulting from traceroute packets to a small number of landmarks, and clusters nodes based on (1) the number of shared hops on their path towards the landmarks, and (2) their proximity to the landmarks. TAO is also highly flexible and can complement all existing structured and unstructured distributed systems. Our experimental results, based on actual Internet data, reveal that with only five landmarks, TAO identifies the closest node to any node with 85% - 90% accuracy and returns nodes that on average are within 1 millisecond from the closest node if the latter is missed. As a result, TAO overlays enjoy very low stretch (between 1.15 and 1.25). Our results also indicate that shortest-path routing on TAO overlays result in shorter end-to-end delays than direct underlay delays in 8-10% of the overlay paths. TAO: A Topology-Adaptive Overlay Framework by Kunal Kandekar A thesis submitted to the Graduate Faculty of North Carolina State University in partial fulfillment of the requirements for the Degree of Master of Science Computer Science Raleigh 2006 Approved by: _______________________________ _______________________________ Dr. -
Nuclear Data
CNIC-00810 CNDC-0013 INDC(CPR)-031/L NUCLEAR DATA No. 10 (1993) China Nuclear Information Center Chinese Nuclear Data Center Atomic Energy Press CNIC-00810 CNDC-0013 INDC(CPR)-031/L COMMUNICATION OF NUCLEAR DATA PROGRESS No. 10 (1993) Chinese Nuclear Data Center China Nuclear Information Centre Atomic Energy Press Beijing, December 1993 EDITORIAL BOARD Editor-in-Chief Liu Tingjin Zhuang Youxiang Member Cai Chonghai Cai Dunjiu Chen Zhenpeng Huang Houkun Liu Tingjin Ma Gonggui Shen Qingbiao Tang Guoyou Tang Hongqing Wang Yansen Wang Yaoqing Zhang Jingshang Zhang Xianqing Zhuang Youxiang Editorial Department Li Manli Sun Naihong Li Shuzhen EDITORIAL NOTE This is the tenth issue of Communication of Nuclear Data Progress (CNDP), in which the achievements in nuclear data field since the last year in China are carried. It includes the measurements of 54Fe(d,a), 56Fe(d,2n), 58Ni(d,a), (d,an), (d,x)57Ni, 182~ 184W(d,2n), 186W(d,p), (d,2n) and S8Ni(n,a) reactions; theoretical calculations on n+160 and ,97Au, 10B(n,n) and (n,n') reac tions, channel theory of fission with diffusive dynamics; the evaluations of in termediate energy nuclear data for 56Fe, 63Cu, 65Cu(p,n) monitor reactions, and of 180Hf, ,8lTa(n,2n) reactions, revision on recommended data of 235U and 238U for CENDL-2; fission barrier parameters sublibrary, a PC software of EXFOR compilation, some reports on atomic and molecular data and covariance research. We hope that our readers and colleagues will not spare their comments, in order to improve the publication. Please write to Drs. -
Heap Feng Shui in Javascript
Heap Feng Shui in JavaScript Alexander Sotirov <[email protected]> Introduction The exploitation of heap corruption vulnerabilities on the Windows platform has become increasingly more difficult since the introduction of XP SP2. Heap protection features such as safe unlinking and heap cookies have been successful in stopping most generic heap exploitation techniques. Methods for bypassing the heap protection exist, but they require a great degree of control over the allocation patterns of the vulnerable application. This paper introduces a new technique for precise manipulation of the browser heap layout using specific sequences of JavaScript allocations. We present a JavaScript library with functions for setting up the heap in a controlled state before triggering a heap corruption bug. This allows us to exploit very difficult heap corruption vulnerabilities with great reliability and precision. We will focus on Internet Explorer exploitation, but the general techniques presented here are potentially applicable to any other browser or scripting environment. Previous work The most widely used browser heap exploitation technique is the heap spraying method developed by SkyLined for his Internet Explorer IFRAME exploit. This technique uses JavaScript to create multiple strings containing a NOP slide and shellcode. The JavaScript runtime stores the data for each string in a new block on the heap. Heap allocations usually start at the beginning of the address space and go up. After allocating 200MB of memory for the strings, any address between 50MB and 200MB is very likely to point at the NOP slide. Overwriting a return address or a function pointer with an address in this range will lead to a jump to the NOP slide and shellcode execution. -
A Defense Against Heap-Spraying Code Injection Attacks
Nozzle: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Benjamin Livshits and Benjamin Zorn Cornell University Microsoft Research Ithaca, NY Redmond, WA November 19, 2008 Microsoft Research Technical Report MSR-TR-2008-176 nnoozzllee 1 Abstract Heap spraying is a new security attack that significantly increases the exploitability of existing memory corruption errors in type-unsafe applications. With heap spraying, attackers leverage their ability to allocate arbitrary objects in the heap of a type-safe language, such as JavaScript, literally filling the heap with objects that contain danger- ous exploit code. In recent years, spraying has been used in many real security exploits, especially in web browsers. In this paper, we describe Nozzle, a runtime monitoring infrastructure that detects attempts by attackers to spray the heap. Nozzle uses lightweight emulation techniques to detect the presence of objects that contain executable code. To reduce false positives, we developed a notion of global “heap health”. We measure the effectiveness of Nozzle by demonstrating that it successfully detects 12 published and 2,000 synthetically generated heap-spraying exploits. We also show that even with a detection threshold set six times lower than is required to detect published ma- licious attacks, Nozzle reports no false positives when run over 150 popular Internet sites. Using sampling and concurrent scanning to re- duce overhead, we show that the performance overhead of Nozzle is less than 7% on average. While Nozzle currently targets heap-based spraying attacks, its techniques can be applied to a more general class of attacks in which an attacker attempts to fill the address space with dangerous code objects. -
ACCESSING DATA with FLEX 2 Accessing Data Services Overview
Accessing Data with ADOBE® FLEX® 4.6 Legal notices Legal notices For legal notices, see http://help.adobe.com/en_US/legalnotices/index.html. Last updated 12/3/2012 iii Contents Chapter 1: Accessing data services overview Data access in Flex compared to other technologies . 1 Using Flash Builder to access data services . 3 Data access components . 4 Chapter 2: Building data-centric applications with Flash Builder Creating a Flex project to access data services . 7 Connecting to data services . 8 Installing Zend Framework . 19 Using a single server instance . 21 Building the client application . 21 Configuring data types for data service operations . 25 Testing service operations . 29 Managing the access of data from the server . 29 Flash Builder code generation for client applications . 33 Deploying applications that access data services . 39 Chapter 3: Implementing services for data-centric applications Action Message Format (AMF) . 43 Client-side and server-side typing . 43 Implementing ColdFusion services . 43 Implementing PHP services . 50 Debugging remote services . 61 Example implementing services from multiple sources . 64 Chapter 4: Accessing server-side data Using HTTPService components . 71 Using WebService components . 80 Using RemoteObject components . 97 Explicit parameter passing and parameter binding . 113 Handling service results . 121 Last updated 12/3/2012 1 Chapter 1: Accessing data services overview Data access in Flex compared to other technologies The way that Flex works with data sources and data is different from applications that use HTML for their user interface. Client-side processing and server-side processing Unlike a set of HTML templates created using JSPs and servlets, ASP, PHP, or CFML, Flex separates client code from server code. -
The Atomic Simulation Environment - a Python Library for Working with Atoms
Downloaded from orbit.dtu.dk on: Sep 28, 2021 The Atomic Simulation Environment - A Python library for working with atoms Larsen, Ask Hjorth; Mortensen, Jens Jørgen; Blomqvist, Jakob; Castelli, Ivano Eligio; Christensen, Rune; Dulak, Marcin; Friis, Jesper; Groves, Michael; Hammer, Bjørk; Hargus, Cory Total number of authors: 34 Published in: Journal of Physics: Condensed Matter Link to article, DOI: 10.1088/1361-648X/aa680e Publication date: 2017 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): Larsen, A. H., Mortensen, J. J., Blomqvist, J., Castelli, I. E., Christensen, R., Dulak, M., Friis, J., Groves, M., Hammer, B., Hargus, C., Hermes, E., C. Jennings, P., Jensen, P. B., Kermode, J., Kitchin, J., Kolsbjerg, E., Kubal, J., Kaasbjerg, K., Lysgaard, S., ... Jacobsen, K. W. (2017). The Atomic Simulation Environment - A Python library for working with atoms. Journal of Physics: Condensed Matter, 29, [273002]. https://doi.org/10.1088/1361-648X/aa680e General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. -
Enterprise Development with Flex
Enterprise Development with Flex Enterprise Development with Flex Yakov Fain, Victor Rasputnis, and Anatole Tartakovsky Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Enterprise Development with Flex by Yakov Fain, Victor Rasputnis, and Anatole Tartakovsky Copyright © 2010 Yakov Fain, Victor Rasputnis, and Anatole Tartakovsky.. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mary E. Treseler Indexer: Ellen Troutman Development Editor: Linda Laflamme Cover Designer: Karen Montgomery Production Editor: Adam Zaremba Interior Designer: David Futato Copyeditor: Nancy Kotary Illustrator: Robert Romano Proofreader: Sada Preisch Printing History: March 2010: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Enterprise Development with Flex, the image of red-crested wood-quails, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein. -
Jitdefender: a Defense Against JIT Spraying Attacks
JITDefender: A Defense against JIT Spraying Attacks Ping Chen, Yi Fang, Bing Mao, and Li Xie State Key Laboratory for Novel Software Technology, Nanjing University Department of Computer Science and Technology, Nanjing University, Nanjing 210093 {chenping,fangyi,maobing,xieli}@nju.edu.cn Abstract. JIT spraying is a new code-reuse technique to attack virtual machines based on JIT (Just-in-time) compilation. It has proven to be capable of circum- venting the defenses such as data execution prevention (DEP) and address space layout randomization(ASLR), which are effective for preventing the traditional code injection attacks. In this paper, we describe JITDefender, an enhancement of standard JIT-based VMs, which can prevent the attacker from executing arbi- trary JIT compiled code on the VM. Thereby JITDefender can block JIT spraying attacks. We prove the effectiveness of JITDefender by demonstrating that it can successfully prevent existing JIT spraying exploits. JITDefender reports no false positives when run over benign actionscript/javascript programs. In addition, we show that the performance overhead of JITDefender is low. 1 Introduction In recent years, attackers have resorted to code-reuse techniques instead of injecting their own malicious code. Typical techniques are Return-oriented Programming (ROP) [21], BCR [12] and Inspector [11]. Different code-reuse attacks launch the attack based on different codebases, including the application, shared libraries or even the kernel. However, all the techniques need to find useful instruction sequence in the codebase, and the task is tedious and costly in practice. Recently, a new code-reuse attack named JIT (Just-In-Time) spraying was proposed by Blazakis [10]. -
Adobe RTMP Specification
Copyright Adobe Systems Incorporated H. Parmar, Ed. M. Thornburgh, Ed. Adobe December 21, 2012 Adobe's Real Time Messaging Protocol Abstract This memo describes Adobe's Real Time Messaging Protocol (RTMP), an application-level protocol designed for multiplexing and packetizing multimedia transport streams (such as audio, video, and interactive content) over a suitable transport protocol (such as TCP). Table of Contents 1. Introduction . 3 1.1. Terminology . 3 2. Contributors . 3 3. Definitions . 3 4. Byte Order, Alignment, and Time Format . 5 5. RTMP Chunk Stream . 5 5.1. Message Format . 6 5.2. Handshake . 7 5.2.1. Handshake Sequence . 7 5.2.2. C0 and S0 Format . 7 5.2.3. C1 and S1 Format . 8 5.2.4. C2 and S2 Format . 8 5.2.5. Handshake Diagram . 10 5.3. Chunking . 11 5.3.1. Chunk Format . 11 5.3.1.1. Chunk Basic Header . 12 5.3.1.2. Chunk Message Header . 13 5.3.1.2.1. Type 0 . 14 5.3.1.2.2. Type 1 . 14 5.3.1.2.3. Type 2 . 15 5.3.1.2.4. Type 3 . 15 5.3.1.2.5. Common Header Fields . 15 5.3.1.3. Extended Timestamp . 16 5.3.2. Examples . 16 5.3.2.1. Example 1 . 16 5.3.2.2. Example 2 . 17 5.4. Protocol Control Messages . 18 5.4.1. Set Chunk Size (1) . 19 5.4.2. Abort Message (2) . 19 5.4.3. Acknowledgement (3) . 20 Parmar & Thornburgh [Page 1] Adobe RTMP December 2012 5.4.4. -
Ajax Security Concerns
Flash Security OWASP KC Meeting March 7, 2007 Rohini Sulatycki OWASP Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org What is Flash? Adobe Flash is the authoring environment Rich Animation Video Action Script 2 FLA Flash Player is the VM that runs SWF byte codes OWASP 2 OWASP 3 What is Flash Remoting? Flash Remoting is a technology for HTTP-based request/response data communication. Supported natively by Flash Player Uses Action Message Format (AMF) for communication Modeled on SOAP Uses packet format OWASP 4 Flash Remoting Communication OWASP 5 Flash Remoting Communication OWASP 6 What is Flex 2? Flex is a framework for creating flash applications. Components Lists, Grids,.. Collection of technologies XML web services HTTP Flash Player ActionScript Flex applications are .swf files which you can then run in Flash Player. OWASP 7 Flash Shared Objects OWASP Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org Shared Objects Similar to cookies Larger data storage 100KB Binary format No cross-domain access (by default) Not downloaded back to web server OWASP 9 Shared Objects Stored outside browser Do not get cleared when browser cache is cleared Accessible across browsers OWASP 10 SOL Editors C:\Documents and Settings\<USERNAME>\Application\Data\Macromedia\Flash Player\#SharedObjects\<RANDOM>\<DOMAINNAME> When you drill down in each domain’s directory, you will eventually find a “SOL” file. -
Normas-ML: Supporting the Modeling of Normative Multi-Agent
49 2019 8 4 ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal. Vol. 8 N. 4 (2019), 49-81 ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal Regular Issue, Vol. 8 N. 4 (2019), 49-81 eISSN: 2255-2863 DOI: http://dx.doi.org/10.14201/ADCAIJ2019844981 NorMAS-ML: Supporting the Modeling of Normative Multi-agent Systems Emmanuel Sávio Silva Freirea, Mariela Inés Cortésb, Robert Marinho da Rocha Júniorb, Enyo José Tavares Gonçalvesc, and Gustavo Augusto Campos de Limab aTeaching Department, Federal Institute of Ceará, Morada Nova, Brazil bComputer Science Department, State University of Ceará, Fortaleza, Brazil cComputer Science Department, Federal University of Ceará, Quixadá, Brazil [email protected], [email protected], [email protected], [email protected], [email protected] KEYWORD ABSTRACT Normative Multi- Context: A normative multi-agent system (NMAS) is composed of agents that their be- agent System; havior is regulated by norms. The modeling of those elements (agents and norms) togeth- Norms; Modeling er at design time can be a good way for a complete understanding of their structure and Language; behavior. Multi-agent system modeling language (MAS-ML) supports the representation NorMAS-ML of NMAS entities, but the support for concepts related to norms is somewhat limited. MAS-ML is founded in taming agents and objects (TAO) framework and has a support tool called the MAS-ML tool. Goal: The present work aims to present a UML-based modeling language called normative multi-agent system (NorMAS-ML) able to model the MAS main entities along with the static normative elements. -
Fighting the War in Memory
Fighting the War in Memory Software Vulnerabilities and Defenses Today Antonio Hüseyin Barresi 2014 2 MorrisMorris WormWorm 3 Long ago – late 1980s • On November 2, 1988 the Morris Worm was released • Mainstream media attention • Conviction under the Computer Fraud and Abuse Act • First well-known program exploiting a buffer overflow http://en.wikipedia.org/wiki/Morris_worm 4 25 years later Memory errors and memory corruption vulnerabilities are still an issue! 5 This talk is about • Why these bugs are still a concern • How exploits work • Modern defenses 6 MotivationMotivation 7 Today, 2014 • Memory errors are still a problem • “Unsafe“ languages like C/C++ very popular • Prediction: C/C++ will be with us for a long time • Yes, there are alternatives... sometimes • Criminals found ways of monetization • Software systems are gaining complexity http://www.langpop.com/ http://www.tiobe.com/index.php/content/paperinfo/tpci/index.html 8 Terminology Exploit “An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug, glitch or vulnerability in order to...“ Zero-Day Attack “A zero-day attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, ...“ http://en.wikipedia.org/wiki/Exploit_(computer_security) http://en.wikipedia.org/wiki/Zero-day_attack 9 Attacks Victim Attacker Runs a malicious web server serving HTML documents that trigger a memory error within the web browser Runs a vulnerable web browser or PDF reader Sends a malicious PDF attachement by email Exploits memory error within vulnerable victim software GET /index.html HTTP/1.1 Host: www.vulnsite.com Keep-Alive: 300 Connection: keep-alive $>./exploit 192.168.1.28 Cookie: CID=r2t5uvjq43 5r4q7ib3vtdjq120f83jf8 ..