SECDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity

被引:0
|
作者
Shen, Dakun [1 ]
Hou, Tao [2 ]
Lu, Zhuo [3 ]
Liu, Yao [3 ]
Wang, Tao [4 ]
机构
[1] Zhejiang Lab, Hangzhou, ZJ, Peoples R China
[2] Texas State Univ, San Marcos, TX USA
[3] Univ S Florida, Tampa, FL 33620 USA
[4] Univ N Carolina, Charlotte, NC USA
关键词
Data-oriented Attacks; Data Integrity; Data-flow Integrity; Intel SGX; Data Enclave;
D O I
10.1109/CNS59707.2023.10289062
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data-oriented attacks with the intent to corrupt critical memory data without violating Control-flow Integrity (CFI) pose significant threats to legitimate program execution. Existing mitigations predominantly rely on software-based memory safety measures to ensure critical data integrity, a solution often associated with elevated performance overhead and susceptibility to intricate attack techniques. In this paper, we present a CPU level data integrity design, named Intel SGX Escorted Data Integrity (SECDINT), to automatically protect sensitive variables against data-oriented attacks. Our design can achieve the data integrity of sensitive variables via SGX enforced isolation in binaries. We evaluate SECDINT on real-world applications. The results reveal that SECDINT can effectively identify sensitive variables, enforce data integrity, and prevent data-oriented attacks. Comparative analysis with existing software-based strategies (e.g., 103% run-time overhead in Data-flow Integrity, 116% in SoftBound with CETS), showcased SECDINT's remarkable capability in drastically reducing overhead to as low as 20.1%.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] A Data-Oriented Model of Literary Language
    van Cranenburgh, Andreas
    Bod, Rens
    [J]. 15TH CONFERENCE OF THE EUROPEAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (EACL 2017), VOL 1: LONG PAPERS, 2017, : 1228 - 1238
  • [32] Developing Games with Data-Oriented Design
    Bayliss, Jessica D.
    [J]. 2022 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON GAMES AND SOFTWARE ENGINEERING (GAS 2022), 2022, : 30 - 36
  • [33] Automatic Generation of Data-Oriented Exploits
    Hu, Hong
    Chua, Zheng Leong
    Adrian, Sendroiu
    Saxena, Prateek
    Liang, Zhenkai
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 177 - 192
  • [34] A DATA-ORIENTED CI PROGRAM SYSTEM
    SASAKI, F
    TANAKA, K
    NORO, T
    TOGASI, M
    NOMURA, T
    SEKIYA, M
    GONOI, T
    OHNO, K
    [J]. THEORETICA CHIMICA ACTA, 1987, 72 (02): : 123 - 138
  • [35] Lazy Data-Oriented Evaluation Strategies
    Totoo, Prabhat
    Loidl, Hans-Wolfgang
    [J]. FHPC'14: PROCEEDINGS OF THE 2014 ACM SIGPLAN WORKSHOP ON FUNCTIONAL HIGH-PERFORMANCE COMPUTING, 2014, : 63 - 74
  • [36] Data-Oriented Downlink RSMA Systems
    Can, Mehmet
    Ilter, Mehmet C.
    Altunbas, Ibrahim
    [J]. IEEE COMMUNICATIONS LETTERS, 2023, 27 (10) : 2812 - 2816
  • [37] DATA-ORIENTED INCREMENTAL PROGRAMMING ENVIRONMENTS
    HENDERSON, PB
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 244 : 13 - 25
  • [38] A data-oriented (and beyond) network architecture
    Koponen, Teemu
    Chawla, Mohit
    Chun, Byung-Gon
    Ermolinskiy, Andrey
    Kim, Kye Hyun
    Shenker, Scott
    Stoica, Ion
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 181 - 192
  • [39] Data-Oriented Intelligent Transportation Systems
    Ibrahim, Hamdy
    Far, Behrouz H.
    [J]. 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 322 - 329
  • [40] Model selection with data-oriented penalty
    Bai, ZD
    Rao, CR
    Wu, Y
    [J]. JOURNAL OF STATISTICAL PLANNING AND INFERENCE, 1999, 77 (01) : 103 - 117