Control Flow Integrity Enforcement with Dynamic Code Optimization

被引:4
|
作者
Lin, Yan [1 ]
Tang, Xiaoxiao [1 ]
Gao, Debin [1 ]
Fu, Jianming [2 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[2] Wuhan Univ, Comp Sch, Wuhan, Peoples R China
来源
关键词
Control Flow Integrity; Return-oriented programming; Dynamic code optimization;
D O I
10.1007/978-3-319-45871-7_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control Flow Integrity (CFI) is an attractive security property with which most injected and code reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). However, comprehensive enforcement of CFI is expensive due to additional supports needed (e.g., compiler support and presence of relocation or debug information) and performance overhead. Recent research has been trying to strike the balance among reasonable approximation of the CFI properties, minimal additional supports needed, and acceptable performance. We investigate existing dynamic code optimization techniques and find that they provide an architecture on which CFI can be enforced effectively and efficiently. In this paper, we propose and implement DynCFI that enforces security policies on a well established dynamic optimizer and show that it provides comparable CFI properties with existing CFI implementations while lowering the overall performance overhead from 28.6% to 14.8%. We further perform comprehensive evaluations and shed light on the exact amount of savings contributed by the various components of the dynamic optimizer including basic block cache, trace cache, branch prediction, and indirect branch lookup.
引用
收藏
页码:366 / 385
页数:20
相关论文
共 50 条
  • [1] Dynamic Enforcement of Platform Integrity
    Pirker, Martin
    Toegl, Ronald
    Gissing, Michael
    [J]. TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 265 - 272
  • [2] Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture
    Gollapudi, Ravi Theja
    Yuksek, Gokturk
    Demicco, David
    Cole, Matthew
    Kothari, Gaurav
    Kulkarni, Rohit
    Zhang, Xin
    Ghose, Kanad
    Prakash, Aravind
    Umrigar, Zerksis
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2974 - 2989
  • [3] Dynamic enforcement of the Strict integrity policy
    Zhang, XF
    Liang, HL
    Sun, YF
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (01) : 49 - 53
  • [4] Static-Dynamic Control Flow Integrity
    Liu, XiaoLong
    Wei, Qiang
    Ye, ZiWei
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 189 - 196
  • [5] Dynamic optimization flow control
    Imer, OC
    Basar, T
    [J]. 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, 2003, : 2082 - 2087
  • [6] Enforcing Unique Code Target Property for Control-Flow Integrity
    Hu, Hong
    Qian, Chenxiong
    Yagemann, Carter
    Chung, Simon Pak Ho
    Harris, William R.
    Kim, Taesoo
    Lee, Wenke
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
  • [7] DroidSentry: Efficient code integrity and control flow verification on TrustZone devices
    Suciu, Darius
    Sion, Radu
    [J]. 2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 156 - 158
  • [8] Principles of Data Flow Integrity: Specification and Enforcement
    Ramezanifarkhani, Toktam
    Razzazi, Mohammadreza
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (02) : 529 - 546
  • [9] In-Depth Enforcement of Dynamic Integrity Taint Analysis
    Amir-Mohammadian, Sepehr
    Skalka, Christian
    [J]. PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16), 2016, : 43 - 56
  • [10] Checking enforcement of integrity constraints in database applications based on code patterns
    Zhang, Hongyu
    Tan, Hee Beng Kuan
    Zhang, Lu
    Lin, Xi
    Wang, Xiaoyin
    Zhang, Chun
    Mei, Hong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2253 - 2264