SoK: On the Effectiveness of Control-Flow Integrity in Practice

被引:0
|
作者
Becker, Lucas [1 ]
Hollick, Matthias [1 ]
Classen, Jiska [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Univ Potsdam, Hasso Plattner Inst, Potsdam, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Complex programs written in memory-unsafe languages tend to contain memory corruption bugs. Adversaries commonly employ code-reuse attacks to exploit these bugs. Control-flow Integrity (CFI) enforcement schemes try to prevent such attacks from achieving arbitrary code execution. Developers can apply these schemes to existing code bases by setting compiler flags, requiring less effort than rewriting code in memory-safe languages. Although many works propose CFI schemes and attacks against them, they paid little attention to schemes deployed to end-users. We provide a systematic categorization and overview of actively used CFI solutions. We then conduct a large-scale binary analysis on 33 Android images of seven vendors and two Windows builds for different hardware architectures to study CFI utilization in practice. We analyzed over 77,000 files on the Android images. We found that depending on the variant, up to 94% of binaries and 93% of libraries are unprotected. All analyzed binaries depend on unprotected libraries, therefore rendering CFI enforcement ineffective. Further, we look at the development of CFI coverage over time on Android and find it stagnating. CFI roll-out is closer to complete on the Windows builds, but not all files are protected yet (2.63% unprotected). Consequently, our results show that the adoption of CFI protection is lacking, putting devices at risk. Additionally, our results highlight a large gap between the state of the art in research and the reality of deployed systems.
引用
收藏
页码:189 / 209
页数:21
相关论文
共 50 条
  • [41] TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection
    She, Cairui
    Chen, Liwei
    Shi, Gang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 407 - 414
  • [42] Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing
    Zeng, Bin
    Tan, Gang
    Morrisett, Greg
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 29 - 39
  • [43] OmniWasm: Efficient, Granular Fault Isolation and Control-Flow Integrity for Arm Microcontrollers
    Bai, Maorui
    Pan, Runyu
    Parmer, Gabriel
    Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS, 2024, : 239 - 251
  • [44] OmniWasm: Efficient, Granular Fault Isolation and Control-Flow Integrity for Arm Microcontrollers
    Bai, Maorui
    Pan, Runyu
    Parmer, Gabriel
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 239 - 251
  • [45] Software-only Control-Flow Integrity against Fault Injection Attacks
    Bonnal, Francois
    Dupaquis, Vincent
    Potin, Olivier
    Dutertre, Jean-Max
    2023 26TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, DSD 2023, 2023, : 269 - 277
  • [46] CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software
    Xu, Xiaoyang
    Ghaffarinia, Masoud
    Wang, Wenhao
    Hamlen, Kevin W.
    Lin, Zhiqiang
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1805 - 1821
  • [47] Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Lehmann, Daniel
    Monrose, Fabian
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 401 - 416
  • [48] Survey of Control-flow Integrity Techniques for Real-time Embedded Systems
    Mishra, Tanmaya
    Chantem, Thidapat
    Gerdes, Ryan
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2022, 21 (04)
  • [49] On the Effectiveness of Hardware Enforced Control Flow Integrity
    Gadient, Austin J.
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 5576 - 5584
  • [50] BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    Shi, Zhihui
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 136