Document Type
Technical Report
Publication Date
4-18-2011
Technical Report Number
TR2011-680
Abstract
All binaries compiled by recent versions of GCC from C++ programs include complex data and dedicated code for exception handling support. The data structures describe the call stack frame layout in the DWARF format bytecode. The dedicated code includes an interpreter of this bytecode and logic to implement the call stack unwinding. Despite being present in a large class of programs -- and therefore potentially providing a huge attack surface -- this mechanism is not widely known or studied. Of particular interest to us is that the exception handling mechanism provides the means for fundamentally altering the flow of a program. DWARF is designed specifically for calculating call frame addresses and register values. DWARF expressions are Turing-complete and may calculate register values based on any readable data in the address space of the process. The exception handling data is in effect an embedded program residing within every C++ process. This talk explores what can be accomplished with control of the exception handling information without modifying the program's text or data. We also examine the exception handling mechanism and argue that it is rife for vulnerability finding, not least because the error states of a program are often those least well tested.
Dartmouth Digital Commons Citation
Oakley, James and Bratus, Sergey, "Exploiting the Hard-Working DWARF: Trojans with no Native Executable Code" (2011). Computer Science Technical Report TR2011-680. https://digitalcommons.dartmouth.edu/cs_tr/341