SoK: On the Effectiveness of Control-Flow Integrity in Practice

被引:0
|
作者
Becker, Lucas [1 ]
Hollick, Matthias [1 ]
Classen, Jiska [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Univ Potsdam, Hasso Plattner Inst, Potsdam, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Complex programs written in memory-unsafe languages tend to contain memory corruption bugs. Adversaries commonly employ code-reuse attacks to exploit these bugs. Control-flow Integrity (CFI) enforcement schemes try to prevent such attacks from achieving arbitrary code execution. Developers can apply these schemes to existing code bases by setting compiler flags, requiring less effort than rewriting code in memory-safe languages. Although many works propose CFI schemes and attacks against them, they paid little attention to schemes deployed to end-users. We provide a systematic categorization and overview of actively used CFI solutions. We then conduct a large-scale binary analysis on 33 Android images of seven vendors and two Windows builds for different hardware architectures to study CFI utilization in practice. We analyzed over 77,000 files on the Android images. We found that depending on the variant, up to 94% of binaries and 93% of libraries are unprotected. All analyzed binaries depend on unprotected libraries, therefore rendering CFI enforcement ineffective. Further, we look at the development of CFI coverage over time on Android and find it stagnating. CFI roll-out is closer to complete on the Windows builds, but not all files are protected yet (2.63% unprotected). Consequently, our results show that the adoption of CFI protection is lacking, putting devices at risk. Additionally, our results highlight a large gap between the state of the art in research and the reality of deployed systems.
引用
收藏
页码:189 / 209
页数:21
相关论文
共 50 条
  • [21] A Survey on Control-Flow Integrity Means in Web Application Frameworks
    Braun, Bastian
    Pollak, Christian V.
    Posegga, Joachim
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246
  • [22] Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications
    Braun, Bastian
    Gries, Caspar
    Petschkuhn, Benedikt
    Posegga, Joachim
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 264 - 277
  • [23] Language Abstractions for Hardware-based Control-Flow Integrity Monitoring
    Harrison, William L.
    Allwein, Gerard
    2018 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2018,
  • [24] PROLEPSIS: Binary analysis and instrumentation of IoT software for control-flow integrity
    Forte, Valentina
    Maunero, Nicolo
    Prinetto, Paolo
    Roascio, Gianluca
    International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021, 2021,
  • [25] KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels
    Criswell, John
    Dautenhahn, Nathan
    Adve, Vikram
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 292 - 307
  • [26] Hardware-Assisted Control-Flow Integrity Enhancement for IoT Devices
    Wang, Weiyi
    Feng, Lang
    Shi, Zhiguo
    Zhuo, Cheng
    Chen, Jiming
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [27] HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
    Wang, Zhi
    Jiang, Xuxian
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 380 - 395
  • [28] Integrating Static Analyses for High-Precision Control-Flow Integrity
    Kasten, Florian
    Zieris, Philipp
    Horsch, Julian
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 419 - 434
  • [29] Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
    Tice, Caroline
    Roeder, Tom
    Collingbourne, Peter
    Checkoway, Stephen
    Erlingsson, Ulfar
    Lozano, Luis
    Pike, Geoff
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 941 - 955
  • [30] Poster: Control-Flow Integrity in Low-end Embedded Devices
    Jakkamsetti, Sashidhar
    Kim, Youngil
    Searles, Andrew
    Tsudik, Gene
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3618 - 3620