A Security Analysis of Labeling-Based Control-Flow Integrity Schemes

被引:0
|
作者
Demicco, David [1 ]
Cole, Matthew [1 ]
Wang, Shengdun [1 ]
Prakash, Aravind [1 ]
机构
[1] Binghamton Univ, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
tagging architectures; control flow integrity; RISC-V architecture; binary analysis;
D O I
10.1109/HiPCW57629.2022.00011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and transparent policy enforcement by a cloud provider is crucial in cloud infrastructures. Particularly, enforcement of control-flow integrity (CFI) policy has been widely accepted for stopping software-induced attacks. Using low-level hardware metadata to encode CFI policy is a fairly recent development. Besides moving enforcement out of the software and into the hardware for performance benefit, tagging metadata also offers other benefits in the precision of defenses. We evaluate several different metadata layouts for CFI policy enforcement, and examine the layouts' effects on the number of valid forward edges remaining in a RISC-V binary after policy enforcement. Additionally we look at related work in tag-based tools that provide CFI policy enforcement in order to get a sense of their performance and the design trade-offs they make. We evaluate our policy and the related works in terms of space and precision trade-offs for forward- and backward-edge CFI, finding that some trade-offs have a higher impact on the number of remaining forward edges, notably return address protection. Additionally, we report that existing backward edge protections can be highly effective, reducing the number of remaining backward edges in a protected binary to an average of 0.034% over an equivalent coarse-grained CFI.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [31] Fine-Grained Control-Flow Integrity for Kernel Software
    Ge, Xinyang
    Talele, Nirupama
    Payer, Mathias
    Jaeger, Trent
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 179 - 194
  • [32] HCIC: Hardware-Assisted Control-Flow Integrity Checking
    Zhang, Jiliang
    Qi, Binhang
    Qin, Zheng
    Qu, Gang
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 458 - 471
  • [33] Enforcing Unique Code Target Property for Control-Flow Integrity
    Hu, Hong
    Qian, Chenxiong
    Yagemann, Carter
    Chung, Simon Pak Ho
    Harris, William R.
    Kim, Taesoo
    Lee, Wenke
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
  • [34] A Survey on Control-Flow Integrity Means in Web Application Frameworks
    Braun, Bastian
    Pollak, Christian V.
    Posegga, Joachim
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246
  • [35] Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications
    Braun, Bastian
    Gries, Caspar
    Petschkuhn, Benedikt
    Posegga, Joachim
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 264 - 277
  • [36] On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques
    Sayeed, Sarwar
    Marco-Gisbert, Hector
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 331 - 344
  • [37] BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    Shi, Zhihui
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 136
  • [38] Control-Flow Analysis of Functional Programs
    Midtgaard, Jan
    ACM COMPUTING SURVEYS, 2012, 44 (03)
  • [39] Pushdown Control-Flow Analysis for Free
    Gilray, Thomas
    Lyde, Steven
    Adams, Michael D.
    Might, Matthew
    Van Horn, David
    ACM SIGPLAN NOTICES, 2016, 51 (01) : 691 - 704
  • [40] Control-flow analysis in cubic time
    Nielson, F
    Seidl, H
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 252 - 268