Control-Flow Bending: On the Effectiveness of Control-Flow Integrity

被引:0
|
作者
Carlini, Nicolas [1 ]
Barresi, Antonio [2 ]
Payer, Mathias [3 ]
Wagner, David [1 ]
Gross, Thomas R. [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Purdue Univ, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control-Flow Integrity (CFI) is a defense which prevents control-flow hijacking attacks. While recent research has shown that coarse-grained CFI does not stop attacks, fine-grained CFI is believed to be secure. We argue that assessing the effectiveness of practical CFI implementations is non-trivial and that common evaluation metrics fail to do so. We then evaluate fully precise static CFI - the most restrictive CFI policy that does not break functionality - and reveal limitations in its security. Using a generalization of non-control-data attacks which we call Control-Flow Bending (CFB), we show how an attacker can leverage a memory corruption vulnerability to achieve Turing-complete computation on memory using just calls to the standard library. We use this attack technique to evaluate fully-precise static CFI on six real binaries and show that in five out of six cases, powerful attacks are still possible. Our results suggest that CFI may not be a reliable defense against memory corruption vulnerabilities. We further evaluate shadow stacks in combination with CFI and find that their presence for security is necessary: deploying shadow stacks removes arbitrary code execution capabilities of attackers in three of six cases.
引用
收藏
页码:161 / 176
页数:16
相关论文
共 50 条
  • [1] SoK: On the Effectiveness of Control-Flow Integrity in Practice
    Becker, Lucas
    Hollick, Matthias
    Classen, Jiska
    PROCEEDINGS OF THE 18TH USENIX WOOT CONFERENCE ON OFFENSIVE TECHNOLOGIES, WOOT 2024, 2024, : 189 - 209
  • [2] Opaque Control-Flow Integrity
    Mohan, Vishwath
    Larsen, Per
    Brunthaler, Stefan
    Hamlen, Kevin W.
    Franz, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [3] Modular Control-Flow Integrity
    Niu, Ben
    Tan, Gang
    ACM SIGPLAN NOTICES, 2014, 49 (06) : 577 - 587
  • [4] Out Of Control: Overcoming Control-Flow Integrity
    Goktas, Enes
    Athanasopoulos, Elias
    Bos, Herbert
    Portokalidis, Georgios
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589
  • [5] Survey on Control-flow Integrity Techniques
    Zhang Z.
    Xue J.-F.
    Zhang J.-C.
    Chen T.
    Tan Y.-A.
    Li Y.-Z.
    Zhang Q.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 489 - 508
  • [6] Control-Flow Integrity: Attacks and Protections
    Sayeed, Sarwar
    Marco-Gisbert, Hector
    Ripoll, Ismael
    Birch, Miriam
    APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [7] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
    Conti, Mauro
    Crane, Stephen
    Davi, Lucas
    Franz, Michael
    Larsen, Per
    Liebchen, Christopher
    Negro, Marco
    Qunaibit, Mohaned
    Sadeghi, Ahmad-Reza
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
  • [8] POSTER: Control-Flow Integrity for Smartphones
    Davi, Lucas
    Dmitrienko, Alexandra
    Egele, Manuel
    Fischer, Thomas
    Holz, Thorsten
    Hund, Ralf
    Nuernberger, Stefan
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 749 - 751
  • [9] On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques
    Sayeed, Sarwar
    Marco-Gisbert, Hector
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 331 - 344
  • [10] Control-Flow Integrity Principles, Implementations, and Applications
    Abadi, Martin
    Budiu, Mihai
    Erlingsson, Ulfar
    Ligatti, Jay
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)