Protecting Instruction Set Randomization from Code Reuse Attacks

被引:1
|
作者
Guanciale, Roberto [1 ]
机构
[1] KTH Royal Inst Technol, Dept Theoret Comp Sci, Stockholm, Sweden
来源
SECURE IT SYSTEMS | 2018年 / 11252卷
关键词
Instruction Set Randomization; Code injection; Code-reuse attacks;
D O I
10.1007/978-3-030-03638-6_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Instruction Set Randomization (ISR) prevents code injection by randomizing the instruction encoding used by programs, thus preventing an attacker from preparing a payload that can be injected in a victim. In this paper we show that code-reuse attacks can be used to circumvent existing ISR techniques and we demonstrate these attacks on an ARMv7 CPU that has been extended with ISR support. To counter this treat, we propose a new ISR that does not have the same vulnerabilities as the existing solutions, imposes moderate decryption cost, does not require additional memory per instruction, and affords efficient random access to the encrypted code. These properties enable efficient hardware implementation of our solution. In order to evaluate our proposal, we implement the new ISR in a hardware simulator and we compare its overhead with respect to existing ISR.
引用
收藏
页码:421 / 436
页数:16
相关论文
共 50 条
  • [41] SCATTERCACHE: Thwarting Cache Attacks via Cache Set Randomization
    Werner, Mario
    Unterluggauer, Thomas
    Giner, Lukas
    Schwarz, Michael
    Gruss, Daniel
    Mangard, Stefan
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 675 - 692
  • [42] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification
    Gionta, Jason
    Enck, William
    Larsen, Per
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
  • [43] It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
    Crane, Stephen
    Volckaert, Stijn
    Schuster, Felix
    Liebchen, Christopher
    Larsen, Per
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Holz, Thorsten
    De Sutter, Bjorn
    Franz, Michael
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 243 - 255
  • [44] Instruction set encoding optimization for code size reduction
    Med, Michael
    Krall, Andreas
    IC-SAMOS: 2007 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING AND SIMULATION, PROCEEDINGS, 2007, : 9 - +
  • [45] Selective code transformation for dual instruction set processors
    Lee, Sheayun
    Lee, Jaejin
    Park, Chang Yun
    Min, Sang Lyul
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2007, 6 (02) : 10
  • [46] RandSys: Thwarting code injection attacks with system service interface Randomization
    Jiang, Xuxian
    Wang, Helen J.
    Xu, Dongyan
    SRDS 2007: 26TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2007, : 209 - +
  • [47] Code generation for a dual instruction set processor based on selective code transformation
    Lee, S
    Lee, J
    Min, SL
    Hiser, J
    Davidson, JW
    SOFTWARE AND COMPILERS FOR EMBEDDED SYSTEMS, 2003, 2826 : 33 - 48
  • [48] Mitigating Code-Reuse Attacks with Control-Flow Locking
    Bletsch, Tyler
    Jiang, Xuxian
    Freeh, Vince
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362
  • [49] XSS Attack Detection and Prevention System Based on Instruction Set Randomization
    Wang, Qijin
    Huang, Jun
    Qi, Xiaoxia
    2019 INTERNATIONAL CONFERENCE ON ADVANCED ELECTRONIC MATERIALS, COMPUTERS AND MATERIALS ENGINEERING (AEMCME 2019), 2019, 563
  • [50] Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table
    Fu, Jianming
    Lin, Yan
    Zhang, Xu
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 394 - 401