[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Efficiently Securing Systems from Code Reuse Attacks

Published: 01 May 2014 Publication History

Abstract

Code reuse attacks (CRAs) are recent security exploits that allow attackers to execute arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump-oriented programming approaches, reuse fragments of the library code, thus avoiding the need for explicit injection of attack code on the stack. Since the executed code is reused existing code, CRAs bypass current hardware and software security measures that prevent execution from data or stack regions of memory. While software-based full control flow integrity (CFI) checking can protect against CRAs, it includes significant overhead, involves non-trivial effort of constructing a control flow graph, relies on proprietary tools and has potential vulnerabilities due to the presence of unintended branch instructions in architectures such as x86—those branches are not checked by the software CFI. We propose branch regulation (BR), a lightweight hardware-supported protection mechanism against the CRAs that addresses all limitations of software CFI. BR enforces simple control flow rules in hardware at the function granularity to disallow arbitrary control flow transfers from one function into the middle of another function. This prevents common classes of CRAs without the complexity and run-time overhead of full CFI enforcement. BR incurs a slowdown of about 2% and increases the code footprint by less than 1% on the average for the SPEC 2006 benchmarks.

Cited By

View all
  • (2021)Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI SchemesACM Transactions on Embedded Computing Systems10.1145/347698920:5s(1-25)Online publication date: 17-Sep-2021
  • (2021)FastCFI: Real-time Control-Flow Integrity Using FPGA without Code InstrumentationACM Transactions on Design Automation of Electronic Systems10.1145/345847126:5(1-39)Online publication date: 5-Jun-2021
  • (2020)TrustFlow-XACM Transactions on Embedded Computing Systems10.1145/339832719:5(1-26)Online publication date: 26-Sep-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Computers
IEEE Transactions on Computers  Volume 63, Issue 5
May 2014
262 pages

Publisher

IEEE Computer Society

United States

Publication History

Published: 01 May 2014

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI SchemesACM Transactions on Embedded Computing Systems10.1145/347698920:5s(1-25)Online publication date: 17-Sep-2021
  • (2021)FastCFI: Real-time Control-Flow Integrity Using FPGA without Code InstrumentationACM Transactions on Design Automation of Electronic Systems10.1145/345847126:5(1-39)Online publication date: 5-Jun-2021
  • (2020)TrustFlow-XACM Transactions on Embedded Computing Systems10.1145/339832719:5(1-26)Online publication date: 26-Sep-2020
  • (2019)FastCFI: Real-Time Control Flow Integrity Using FPGA Without Code InstrumentationRuntime Verification10.1007/978-3-030-32079-9_13(221-238)Online publication date: 8-Oct-2019
  • (2017)SOFIAComputers and Security10.1016/j.cose.2017.03.01368:C(16-35)Online publication date: 1-Jul-2017
  • (2016)SOFIAProceedings of the 2016 Conference on Design, Automation & Test in Europe10.5555/2971808.2972083(1172-1177)Online publication date: 14-Mar-2016
  • (2013)Check My ProfileProceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 814510.1007/978-3-642-41284-4_4(62-81)Online publication date: 23-Oct-2013

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media