/viper

A tool for automatically identifying syscall-guard variables

Primary LanguageCMIT LicenseMIT

VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks

VIPER can automatically identify syscall-guard vairables for data-only attacks. It has two main components:

  • BranchForcer (built on AFL) shortlists candidates of syscall-guard branches;
  • VariableRator measures the feasibility of corrupting syscall-guard variables.

The overview of VIPER

Please check our paper published on USENIX Security 2023 for more details.

Prerequisite

Build

./build.sh

Test applications

End-to-end Attacks

Authors

Publication

VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks

@inproceedings{ye:viper,
  title        = {{VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks}},
  author       = {Hengkai Ye and Song Liu and Zhechang Zhang and Hong Hu},
  booktitle    = {Proceedings of the 32nd USENIX Security Symposium (USENIX 2023)},
  month        = {aug},
  year         = {2023},
  address      = {Anaheim, CA},
}

Acknowledgment

We thank National Science Foundation (NSF) for supporting our work. This research is supported by NSF under grant CNS-2247652.