A Security Analysis of Labeling-Based Control-Flow Integrity Schemes

被引:0
|
作者
Demicco, David [1 ]
Cole, Matthew [1 ]
Wang, Shengdun [1 ]
Prakash, Aravind [1 ]
机构
[1] Binghamton Univ, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
tagging architectures; control flow integrity; RISC-V architecture; binary analysis;
D O I
10.1109/HiPCW57629.2022.00011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and transparent policy enforcement by a cloud provider is crucial in cloud infrastructures. Particularly, enforcement of control-flow integrity (CFI) policy has been widely accepted for stopping software-induced attacks. Using low-level hardware metadata to encode CFI policy is a fairly recent development. Besides moving enforcement out of the software and into the hardware for performance benefit, tagging metadata also offers other benefits in the precision of defenses. We evaluate several different metadata layouts for CFI policy enforcement, and examine the layouts' effects on the number of valid forward edges remaining in a RISC-V binary after policy enforcement. Additionally we look at related work in tag-based tools that provide CFI policy enforcement in order to get a sense of their performance and the design trade-offs they make. We evaluate our policy and the related works in terms of space and precision trade-offs for forward- and backward-edge CFI, finding that some trade-offs have a higher impact on the number of remaining forward edges, notably return address protection. Additionally, we report that existing backward edge protections can be highly effective, reducing the number of remaining backward edges in a protected binary to an average of 0.034% over an equivalent coarse-grained CFI.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [21] Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing
    Zeng, Bin
    Tan, Gang
    Morrisett, Greg
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 29 - 39
  • [22] RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity
    Zhang, Jun
    Hou, Rui
    Fan, Junfeng
    Liu, Ke
    Zhang, Lixin
    McKee, Sally A.
    ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2017, 2017, : 27 - 34
  • [23] RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity
    Li, Xiaoxin
    Li, Jiazhen
    Hou, Rui
    Meng, Dan
    17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020), 2020, : 158 - 164
  • [24] Hard Edges: Hardware-Based Control-Flow Integrity for Embedded Devices
    Christou, George
    Vasiliadis, Giorgos
    Athanasopoulos, Elias
    Ioannidis, Sotiris
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2021, 2022, 13227 : 275 - 287
  • [25] Program recognition and testing based on control-flow analysis
    Pai, WC
    NINTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, 2003 PROCEEDINGS, 2003, : 70 - 74
  • [26] Demand Control-Flow Analysis
    Germane, Kimball
    McCarthy, Jay
    Adams, Michael D.
    Might, Matthew
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2019, 2019, 11388 : 226 - 246
  • [27] Concolic Execute Fuzzing Based on Control-Flow Analysis
    Li, Jingxi
    Xu, Xin
    Liao, Lejian
    Li, Lu
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 385 - 389
  • [28] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
    Conti, Mauro
    Crane, Stephen
    Davi, Lucas
    Franz, Michael
    Larsen, Per
    Liebchen, Christopher
    Negro, Marco
    Qunaibit, Mohaned
    Sadeghi, Ahmad-Reza
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963
  • [29] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies
    Zeng, Dongrui
    Niu, Ben
    Tan, Gang
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 810 - 821
  • [30] SafeController: Efficient and Transparent Control-Flow Integrity for RTL Design
    Islam, Sheikh Ariful
    Katkoori, Srinivas
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 270 - 275