Protecting Instruction Set Randomization from Code Reuse Attacks

被引:1
|
作者
Guanciale, Roberto [1 ]
机构
[1] KTH Royal Inst Technol, Dept Theoret Comp Sci, Stockholm, Sweden
来源
SECURE IT SYSTEMS | 2018年 / 11252卷
关键词
Instruction Set Randomization; Code injection; Code-reuse attacks;
D O I
10.1007/978-3-030-03638-6_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Instruction Set Randomization (ISR) prevents code injection by randomizing the instruction encoding used by programs, thus preventing an attacker from preparing a payload that can be injected in a victim. In this paper we show that code-reuse attacks can be used to circumvent existing ISR techniques and we demonstrate these attacks on an ARMv7 CPU that has been extended with ISR support. To counter this treat, we propose a new ISR that does not have the same vulnerabilities as the existing solutions, imposes moderate decryption cost, does not require additional memory per instruction, and affords efficient random access to the encrypted code. These properties enable efficient hardware implementation of our solution. In order to evaluate our proposal, we implement the new ISR in a hardware simulator and we compare its overhead with respect to existing ISR.
引用
收藏
页码:421 / 436
页数:16
相关论文
共 50 条
  • [1] Hardware-based Instruction Set Randomization against Code Injection Attacks
    Du, San
    Shu, Hui
    Kang, Fei
    Xiong, Xiaobing
    Wang, Zheng
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1426 - 1433
  • [2] Marlin: Mitigating Code Reuse Attacks Using Code Randomization
    Gupta, Aditi
    Habibi, Javid
    Kirkpatrick, Michael S.
    Bertino, Elisa
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 326 - 337
  • [3] Defensing Code Reuse Attacks Using Live Code Randomization
    Zhang G.-M.
    Li Q.-B.
    Zeng G.-Y.
    Zhao Y.-T.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2772 - 2790
  • [4] Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks
    Zhang, Mingwei
    Polychronakis, Michalis
    Sekar, R.
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 128 - 140
  • [5] Known/chosen key attacks against software instruction set randomization
    Weiss, Yoav
    Barrantes, Elena Gabriela
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 349 - +
  • [6] Code Shredding: Byte-Granular Randomization of Program Layout for Detecting Code-Reuse Attacks
    Shioji, Eitaro
    Kawakoya, Yuhei
    Iwamura, Makoto
    Hariu, Takeo
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 309 - 318
  • [7] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024,
  • [8] On Detecting Code Reuse Attacks
    Kosolapov, Y. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 573 - 583
  • [9] Reviving Instruction Set Randomization
    Sinha, Kanad
    Kemerlis, Vasileios P.
    Sethumadhavan, Simha
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 21 - 28
  • [10] On Detecting Code Reuse Attacks
    Y. V. Kosolapov
    Automatic Control and Computer Sciences, 2020, 54 : 573 - 583