RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity

被引:0
|
作者
Li, Xiaoxin [1 ]
Li, Jiazhen [1 ]
Hou, Rui [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Sch Cyber Secur, Univ Chinese Acad Sci, Inst Informat Engn,SKLOIS, Beijing, Peoples R China
关键词
ROP; backward CFI; RAS; RISCV;
D O I
10.1145/3387902.3392629
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Return-oriented programming (ROP) is the major exploitation technique to hijack control flow in the presence of non-executable page protections. ROP can be prohibited by ensuring that ret targets legal position. One method is to check whether the predecessor of the target of a ret is a call to identify the illegal use of return. Performing check at each ret with low performance overhead is challenging. To reduce the performance overhead, prior proposals check at critical API functions or system calls and rely on the OS to identify these events. The goal of this paper is to mitigate ROP attacks while incurring negligible storage and performance overheads, and without relying on OS support. This paper proposes a hardware mechanism RCecker (Return-Call pair checker) to enforce the backward CFI (control flow integrity). We propose RCecker-S checking at each ret when the target of the ret has been figured out at EX stage. We analyze the cause of the high performance overhead of RCecker-S. We further propose RCecker-R checking only when RAS (Return Address Stack) mispredicts the targets to reduce the performance overhead. However, the attacker can use Spectre-like attack to pollute RAS and bypass the check of RCecker-R. We propose RCecker-spec based on RCecker-R in addition to check at each speculative ret when the target of the ret has been predicted at the fetch stage. We implement RCecker on RISCV BOOM core and evaluate its security effectiveness and performance overhead. RCecker-spec can successfully detect the ROP attacks in RIPE benchmark. For the SPECINT CPU2006 benchmark, the average performance overhead is 0.69%.
引用
收藏
页码:158 / 164
页数:7
相关论文
共 50 条
  • [21] Control Flow Integrity Based on Lightweight Encryption Architecture
    Qiu, Pengfei
    Lyu, Yongqiang
    Zhang, Jiliang
    Wang, Dongsheng
    Qu, Gang
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) : 1358 - 1369
  • [22] CONTINUATIONS AS A GENERIC CONTROL-FLOW MECHANISM
    CORTES, U
    SESA, E
    FURNARI, MM
    DINAPOLI, C
    NAPOLITANO, R
    KNOWLEDGE ORIENTED SOFTWARE DESIGN, 1993, 27 : 237 - 250
  • [23] Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
    Koutroumpouchos, Nikos
    Ntantogian, Christoforos
    Menesidou, Sofia-Anna
    Liang, Kaitai
    Gouvas, Panagiotis
    Xenakis, Christos
    Giannetsos, Thanassis
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), 2019, : 84 - 92
  • [24] HCFI: Hardware-enforced Control-Flow Integrity
    Christoulakis, Nick
    Christou, George
    Athanasopoulos, Elias
    Ioannidis, Sotiris
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 38 - 49
  • [25] Renewable Just-In-Time Control-Flow Integrity
    Bauman, Erick
    Duan, Jun
    Hamlen, Kevin W.
    Lin, Zhiqiang
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 580 - 594
  • [26] Hard Edges: Hardware-Based Control-Flow Integrity for Embedded Devices
    Christou, George
    Vasiliadis, Giorgos
    Athanasopoulos, Elias
    Ioannidis, Sotiris
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2021, 2022, 13227 : 275 - 287
  • [27] Improved rule-based backward fuzzy reasoning algorithm
    Zhang, Wen
    Zhang, Gui-Xu
    Tongxin Xuebao/Journal on Communications, 2008, 29 (02): : 101 - 105
  • [28] Lightweight Control-Flow Instrumentation and Postmortem Analysis in Support of Debugging
    Ohmann, Peter
    Liblit, Ben
    2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 378 - 388
  • [29] Lightweight control-flow instrumentation and postmortem analysis in support of debugging
    Peter Ohmann
    Ben Liblit
    Automated Software Engineering, 2017, 24 : 865 - 904
  • [30] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
    Conti, Mauro
    Crane, Stephen
    Davi, Lucas
    Franz, Michael
    Larsen, Per
    Liebchen, Christopher
    Negro, Marco
    Qunaibit, Mohaned
    Sadeghi, Ahmad-Reza
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 952 - 963