In computer security, heap feng shui (also known as heap grooming[1]) is a technique used in exploits to facilitate arbitrary code execution.[2] The technique attempts to manipulate the layout of the heap by making heap allocations of carefully selected sizes. It is named after feng shui, an ancient Chinese system of aesthetics that involves the selection of precise alignments in space.

Operation

edit

The term is general and can be used to describe a variety of techniques for bypassing heap protection strategies. The paper often credited with naming the technique, "Heap Feng Shui in JavaScript",[3] used it to refer to an exploit in which a dangling pointer was aligned with a portion of an attacker-controlled chunk. However, it has also found usage in capture the flag events to describe attacks that exploit characteristics of heap layout, such as the spacing between chunks.[4]

See also

edit

References

edit
  1. ^ "What is a "good" memory corruption vulnerability?". Google Project Zero. June 26, 2015. Retrieved 2020-11-11.
  2. ^ "Heaps and Bounds". Trend Micro. September 3, 2007. Archived from the original on 2011-07-17. Retrieved 2009-08-10.
  3. ^ "Heap Feng Shui in Javascript" (PDF). BlackHat. Black Hat Europe. Retrieved 11 October 2018.
  4. ^ Keith, Bruno. "Baby Feng Shui". GitHub. Retrieved 19 June 2018.
edit