DSLR-: A low-overhead data structure layout randomization for defending data-oriented programming

被引:0
|
作者
Wei, Jin [1 ,2 ]
Chen, Ping [2 ,3 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
[2] Fudan Univ, Inst BigData, Shanghai, Peoples R China
[3] Purple Mt Labs, Nanjing, Peoples R China
关键词
Memory corruption attacks; data-oriented programming; data structure layout randomization;
D O I
10.3233/JCS-230053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By developing a Turing-complete non-control data attack to bypass existing defenses against control flow attacks, Data-Oriented Programming (DOP) has gained significant attention from researchers in recent years. While several defense techniques have been proposed to mitigate DOP attacks, they often introduce substantial overhead due to the blind protection of a large range of data objects. To address this issue, we focus on selecting and protecting the specific target data that are of interest to DOP attackers, rather than securing the entire non-control data in the program. In this regard, we perform static analysis on 20 real-world applications and identify the target data, verifying that they constitute only a small percentage of the overall program, averaging around 3%. Additionally, we propose a semi-automated tool to analyze how to chain operations on the target data in these 20 applications to achieve Turing-complete attacks. Furthermore, we introduce DSLR-: a low-overhead Data Structure Layout Randomization (DSLR) method, which modifies the existing DSLR technique to only randomize the selected target data for DOP. Experimental results demonstrate that DSLR- effectively mitigates DOP attacks, reducing performance overhead by 71.2% and memory overhead by 82.5% compared to the original DSLR technique.
引用
收藏
页码:221 / 246
页数:26
相关论文
共 50 条
  • [1] Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    COMPUTERS & SECURITY, 2020, 89
  • [2] DATA-ORIENTED INCREMENTAL PROGRAMMING ENVIRONMENTS
    HENDERSON, PB
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 244 : 13 - 25
  • [3] Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
    Hu, Hong
    Shinde, Shweta
    Adrian, Sendroiu
    Chua, Zheng Leong
    Saxena, Prateek
    Liang, Zhenkai
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 969 - 986
  • [4] DATA PATH DEBUGGING - DATA-ORIENTED DEBUGGING FOR A CONCURRENT PROGRAMMING LANGUAGE
    HSEUSH, W
    KAISER, GE
    SIGPLAN NOTICES, 1989, 24 (01): : 236 - 247
  • [5] A privacy data-oriented hierarchical mapreduce programming model
    Han, Haiwen
    Zheng, Weiping
    Han, H. (hanhw@scnu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11): : 4587 - 4593
  • [6] A Low-Overhead Integrity Verification for Big Data Transfers
    Arslan, Engin
    Alhussen, Ahmed
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4227 - 4236
  • [7] Pushing the Boundaries of Small Tasks: Scalable Low-Overhead Data-Flow Programming in TTG
    Schuchart, Joseph
    Nookala, Poornima
    Herault, Thomas
    Valeev, Edward F.
    Bosilca, George
    2022 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER 2022), 2022, : 117 - 128
  • [8] STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
    Pewny, Jannik
    Koppe, Philipp
    Holz, Thorsten
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 111 - 126
  • [9] Towards Low-Overhead Resilience for Data Parallel Deep Learning
    Nicolae, Bogdan
    Hobson, Tanner
    Yildiz, Orcun
    Peterka, Tom
    Morozov, Dmitry
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 336 - 345
  • [10] DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software
    Wang, Ye
    Chen, Zhifeng
    Li, Qingbao
    Zhang, Ping
    Zhang, Guimin
    IEEE ACCESS, 2019, 7 : 73455 - 73468