HCIC: Hardware-Assisted Control-Flow Integrity Checking

被引:42
|
作者
Zhang, Jiliang [1 ]
Qi, Binhang [1 ]
Qin, Zheng [1 ]
Qu, Gang [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 01期
关键词
Code reuse attacks (CRAs); control flow integrity (CFI); hardware-assisted security; physical unclonable function (PUF);
D O I
10.1109/JIOT.2018.2866164
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threats. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardware-based, have been proposed. However, software-based methods are difficult to be deployed in practical systems due to high performance overhead. Hardware-based methods can reduce performance overhead but may require extending instruction set architectures (ISAs) and modifying the compiler or suffer the vulnerability of key leakage. To tackle these issues, this paper proposes a new hardware-assisted control flow checking method to resist CRAs with negligible performance overhead without extending ISAs, modifying the compiler or leaking the encryption/decryption key. The key technique involves two control flow checking mechanisms. The first one is the encrypted Hamming distances matching between the physical unclonable function (PUF) response and the return addresses, which prevents attackers from returning between gadgets so long as the PUF response is secret, thus resisting ROP attacks. The second one is the linear encryption/decryption operation (XOR) between the PUF response and the instructions at target addresses of call and jmp instructions to defeat JOP attacks. Advanced return-based full-function reuse attacks will be prevented with the dynamic key-updating method. Experimental evaluations on benchmarks demonstrate that the proposed method introduces negligible 0.95% runtime overhead and 0.78% binary size overhead on average.
引用
收藏
页码:458 / 471
页数:14
相关论文
共 50 条
  • [1] ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity
    Li, Jinfeng
    Chen, Liwei
    Shi, Gang
    Chen, Kai
    Meng, Dan
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (11) : 3165 - 3176
  • [2] Hardware-Assisted Code-Pointer Tagging for Forward-Edge Control-Flow Integrity
    Kim, Yonghae
    Kar, Anurag
    Lee, Jaewon
    Lee, Jaekyu
    Kim, Hyesoon
    [J]. IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (02) : 117 - 120
  • [3] Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems
    Wang, Jiang
    Sun, Kun
    Stavrou, Angelos
    [J]. 2012 42ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2012,
  • [4] HAFIX: Hardware-Assisted Flow Integrity Extension
    Davi, Lucas
    Hanreich, Matthias
    Paul, Debayan
    Sadeghi, Ahmad-Reza
    Koeberl, Patrick
    Sullivan, Dean
    Arias, Orlando
    Jin, Yier
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [5] Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey
    Kumar, Sandeep
    Moolchandani, Diksha
    Sarangi, Smruti R.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [6] Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation
    Davi, Lucas
    Koeberl, Patrick
    Sadeghi, Ahmad-Reza
    [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [7] HyperCheck: A Hardware-Assisted Integrity Monitor
    Zhang, Fengwei
    Wang, Jiang
    Sun, Kun
    Stavrou, Angelos
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) : 332 - 344
  • [8] HCFI: Hardware-enforced Control-Flow Integrity
    Christoulakis, Nick
    Christou, George
    Athanasopoulos, Elias
    Ioannidis, Sotiris
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 38 - 49
  • [9] Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory
    Muench, Marius
    Pagani, Fabio
    Shoshitaishvili, Yan
    Kruegel, Christopher
    Vigna, Giovanni
    Balzarotti, Davide
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2016, 2016, 9854 : 24 - 48
  • [10] Hyper Check: A Hardware-Assisted Integrity Monitor
    Wang, Jiang
    Stavrou, Angelos
    Ghosh, Anup
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 158 - 177