A Security Analysis of Labeling-Based Control-Flow Integrity Schemes

被引:0
|
作者
Demicco, David [1 ]
Cole, Matthew [1 ]
Wang, Shengdun [1 ]
Prakash, Aravind [1 ]
机构
[1] Binghamton Univ, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
tagging architectures; control flow integrity; RISC-V architecture; binary analysis;
D O I
10.1109/HiPCW57629.2022.00011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and transparent policy enforcement by a cloud provider is crucial in cloud infrastructures. Particularly, enforcement of control-flow integrity (CFI) policy has been widely accepted for stopping software-induced attacks. Using low-level hardware metadata to encode CFI policy is a fairly recent development. Besides moving enforcement out of the software and into the hardware for performance benefit, tagging metadata also offers other benefits in the precision of defenses. We evaluate several different metadata layouts for CFI policy enforcement, and examine the layouts' effects on the number of valid forward edges remaining in a RISC-V binary after policy enforcement. Additionally we look at related work in tag-based tools that provide CFI policy enforcement in order to get a sense of their performance and the design trade-offs they make. We evaluate our policy and the related works in terms of space and precision trade-offs for forward- and backward-edge CFI, finding that some trade-offs have a higher impact on the number of remaining forward edges, notably return address protection. Additionally, we report that existing backward edge protections can be highly effective, reducing the number of remaining backward edges in a protected binary to an average of 0.034% over an equivalent coarse-grained CFI.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [1] Control-Flow Integrity: Precision, Security, and Performance
    Burow, Nathan
    Carr, Scott A.
    Nash, Joseph
    Larsen, Per
    Franz, Michael
    Brunthaler, Stefan
    Payer, Mathias
    ACM COMPUTING SURVEYS, 2017, 50 (01)
  • [2] Control-Flow Bending: On the Effectiveness of Control-Flow Integrity
    Carlini, Nicolas
    Barresi, Antonio
    Payer, Mathias
    Wagner, David
    Gross, Thomas R.
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 161 - 176
  • [3] Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity
    Shanbhogue, Vedvyas
    Gupta, Deepak
    Sahita, Ravi
    PROCEEDINGS OF THE 8TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP '19, 2019,
  • [4] Opaque Control-Flow Integrity
    Mohan, Vishwath
    Larsen, Per
    Brunthaler, Stefan
    Hamlen, Kevin W.
    Franz, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [5] Modular Control-Flow Integrity
    Niu, Ben
    Tan, Gang
    ACM SIGPLAN NOTICES, 2014, 49 (06) : 577 - 587
  • [6] Out Of Control: Overcoming Control-Flow Integrity
    Goktas, Enes
    Athanasopoulos, Elias
    Bos, Herbert
    Portokalidis, Georgios
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589
  • [7] Survey on Control-flow Integrity Techniques
    Zhang Z.
    Xue J.-F.
    Zhang J.-C.
    Chen T.
    Tan Y.-A.
    Li Y.-Z.
    Zhang Q.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 489 - 508
  • [8] Control-Flow Integrity: Attacks and Protections
    Sayeed, Sarwar
    Marco-Gisbert, Hector
    Ripoll, Ismael
    Birch, Miriam
    APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [9] POSTER: Control-Flow Integrity for Smartphones
    Davi, Lucas
    Dmitrienko, Alexandra
    Egele, Manuel
    Fischer, Thomas
    Holz, Thorsten
    Hund, Ralf
    Nuernberger, Stefan
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 749 - 751
  • [10] Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS
    Qiang, Weizhong
    Wang, Shizhen
    Jin, Hai
    Zhong, Jiangying
    SECURITY AND COMMUNICATION NETWORKS, 2018,