RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity

被引:0
|
作者
Li, Xiaoxin [1 ]
Li, Jiazhen [1 ]
Hou, Rui [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Sch Cyber Secur, Univ Chinese Acad Sci, Inst Informat Engn,SKLOIS, Beijing, Peoples R China
关键词
ROP; backward CFI; RAS; RISCV;
D O I
10.1145/3387902.3392629
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Return-oriented programming (ROP) is the major exploitation technique to hijack control flow in the presence of non-executable page protections. ROP can be prohibited by ensuring that ret targets legal position. One method is to check whether the predecessor of the target of a ret is a call to identify the illegal use of return. Performing check at each ret with low performance overhead is challenging. To reduce the performance overhead, prior proposals check at critical API functions or system calls and rely on the OS to identify these events. The goal of this paper is to mitigate ROP attacks while incurring negligible storage and performance overheads, and without relying on OS support. This paper proposes a hardware mechanism RCecker (Return-Call pair checker) to enforce the backward CFI (control flow integrity). We propose RCecker-S checking at each ret when the target of the ret has been figured out at EX stage. We analyze the cause of the high performance overhead of RCecker-S. We further propose RCecker-R checking only when RAS (Return Address Stack) mispredicts the targets to reduce the performance overhead. However, the attacker can use Spectre-like attack to pollute RAS and bypass the check of RCecker-R. We propose RCecker-spec based on RCecker-R in addition to check at each speculative ret when the target of the ret has been predicted at the fetch stage. We implement RCecker on RISCV BOOM core and evaluate its security effectiveness and performance overhead. RCecker-spec can successfully detect the ROP attacks in RIPE benchmark. For the SPECINT CPU2006 benchmark, the average performance overhead is 0.69%.
引用
收藏
页码:158 / 164
页数:7
相关论文
共 50 条
  • [1] RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity
    Zhang, Jun
    Hou, Rui
    Fan, Junfeng
    Liu, Ke
    Zhang, Lixin
    McKee, Sally A.
    ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2017, 2017, : 27 - 34
  • [2] Control-Flow Bending: On the Effectiveness of Control-Flow Integrity
    Carlini, Nicolas
    Barresi, Antonio
    Payer, Mathias
    Wagner, David
    Gross, Thomas R.
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 161 - 176
  • [3] HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
    Wang, Zhi
    Jiang, Xuxian
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 380 - 395
  • [4] Opaque Control-Flow Integrity
    Mohan, Vishwath
    Larsen, Per
    Brunthaler, Stefan
    Hamlen, Kevin W.
    Franz, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [5] Modular Control-Flow Integrity
    Niu, Ben
    Tan, Gang
    ACM SIGPLAN NOTICES, 2014, 49 (06) : 577 - 587
  • [6] LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation
    Gonzalez-Gomez, Jeferson
    Nassar, Hassan
    Bauer, Lars
    Henkel, Joerg
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 222 - 226
  • [7] Out Of Control: Overcoming Control-Flow Integrity
    Goktas, Enes
    Athanasopoulos, Elias
    Bos, Herbert
    Portokalidis, Georgios
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 575 - 589
  • [8] Survey on Control-flow Integrity Techniques
    Zhang Z.
    Xue J.-F.
    Zhang J.-C.
    Chen T.
    Tan Y.-A.
    Li Y.-Z.
    Zhang Q.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 489 - 508
  • [9] Control-Flow Integrity: Attacks and Protections
    Sayeed, Sarwar
    Marco-Gisbert, Hector
    Ripoll, Ismael
    Birch, Miriam
    APPLIED SCIENCES-BASEL, 2019, 9 (20):
  • [10] POSTER: Control-Flow Integrity for Smartphones
    Davi, Lucas
    Dmitrienko, Alexandra
    Egele, Manuel
    Fischer, Thomas
    Holz, Thorsten
    Hund, Ralf
    Nuernberger, Stefan
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 749 - 751