RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity

被引:0
|
作者
Li, Xiaoxin [1 ]
Li, Jiazhen [1 ]
Hou, Rui [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Sch Cyber Secur, Univ Chinese Acad Sci, Inst Informat Engn,SKLOIS, Beijing, Peoples R China
关键词
ROP; backward CFI; RAS; RISCV;
D O I
10.1145/3387902.3392629
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Return-oriented programming (ROP) is the major exploitation technique to hijack control flow in the presence of non-executable page protections. ROP can be prohibited by ensuring that ret targets legal position. One method is to check whether the predecessor of the target of a ret is a call to identify the illegal use of return. Performing check at each ret with low performance overhead is challenging. To reduce the performance overhead, prior proposals check at critical API functions or system calls and rely on the OS to identify these events. The goal of this paper is to mitigate ROP attacks while incurring negligible storage and performance overheads, and without relying on OS support. This paper proposes a hardware mechanism RCecker (Return-Call pair checker) to enforce the backward CFI (control flow integrity). We propose RCecker-S checking at each ret when the target of the ret has been figured out at EX stage. We analyze the cause of the high performance overhead of RCecker-S. We further propose RCecker-R checking only when RAS (Return Address Stack) mispredicts the targets to reduce the performance overhead. However, the attacker can use Spectre-like attack to pollute RAS and bypass the check of RCecker-R. We propose RCecker-spec based on RCecker-R in addition to check at each speculative ret when the target of the ret has been predicted at the fetch stage. We implement RCecker on RISCV BOOM core and evaluate its security effectiveness and performance overhead. RCecker-spec can successfully detect the ROP attacks in RIPE benchmark. For the SPECINT CPU2006 benchmark, the average performance overhead is 0.69%.
引用
收藏
页码:158 / 164
页数:7
相关论文
共 50 条
  • [31] Lightweight control-flow instrumentation and postmortem analysis in support of debugging
    Ohmann, Peter
    Liblit, Ben
    AUTOMATED SOFTWARE ENGINEERING, 2017, 24 (04) : 865 - 904
  • [32] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies
    Zeng, Dongrui
    Niu, Ben
    Tan, Gang
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 810 - 821
  • [33] Rule-based reactor control
    不详
    CONTROL ENGINEERING, 2005, 52 (07) : IP1 - +
  • [34] SafeController: Efficient and Transparent Control-Flow Integrity for RTL Design
    Islam, Sheikh Ariful
    Katkoori, Srinivas
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 270 - 275
  • [35] Fine-Grained Control-Flow Integrity for Kernel Software
    Ge, Xinyang
    Talele, Nirupama
    Payer, Mathias
    Jaeger, Trent
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 179 - 194
  • [36] HCIC: Hardware-Assisted Control-Flow Integrity Checking
    Zhang, Jiliang
    Qi, Binhang
    Qin, Zheng
    Qu, Gang
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 458 - 471
  • [37] Enforcing Unique Code Target Property for Control-Flow Integrity
    Hu, Hong
    Qian, Chenxiong
    Yagemann, Carter
    Chung, Simon Pak Ho
    Harris, William R.
    Kim, Taesoo
    Lee, Wenke
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1470 - 1486
  • [38] A Survey on Control-Flow Integrity Means in Web Application Frameworks
    Braun, Bastian
    Pollak, Christian V.
    Posegga, Joachim
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 231 - 246
  • [39] Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications
    Braun, Bastian
    Gries, Caspar
    Petschkuhn, Benedikt
    Posegga, Joachim
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 264 - 277
  • [40] Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS
    Qiang, Weizhong
    Wang, Shizhen
    Jin, Hai
    Zhong, Jiangying
    SECURITY AND COMMUNICATION NETWORKS, 2018,