RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity

被引:0
|
作者
Li, Xiaoxin [1 ]
Li, Jiazhen [1 ]
Hou, Rui [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Sch Cyber Secur, Univ Chinese Acad Sci, Inst Informat Engn,SKLOIS, Beijing, Peoples R China
关键词
ROP; backward CFI; RAS; RISCV;
D O I
10.1145/3387902.3392629
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Return-oriented programming (ROP) is the major exploitation technique to hijack control flow in the presence of non-executable page protections. ROP can be prohibited by ensuring that ret targets legal position. One method is to check whether the predecessor of the target of a ret is a call to identify the illegal use of return. Performing check at each ret with low performance overhead is challenging. To reduce the performance overhead, prior proposals check at critical API functions or system calls and rely on the OS to identify these events. The goal of this paper is to mitigate ROP attacks while incurring negligible storage and performance overheads, and without relying on OS support. This paper proposes a hardware mechanism RCecker (Return-Call pair checker) to enforce the backward CFI (control flow integrity). We propose RCecker-S checking at each ret when the target of the ret has been figured out at EX stage. We analyze the cause of the high performance overhead of RCecker-S. We further propose RCecker-R checking only when RAS (Return Address Stack) mispredicts the targets to reduce the performance overhead. However, the attacker can use Spectre-like attack to pollute RAS and bypass the check of RCecker-R. We propose RCecker-spec based on RCecker-R in addition to check at each speculative ret when the target of the ret has been predicted at the fetch stage. We implement RCecker on RISCV BOOM core and evaluate its security effectiveness and performance overhead. RCecker-spec can successfully detect the ROP attacks in RIPE benchmark. For the SPECINT CPU2006 benchmark, the average performance overhead is 0.69%.
引用
收藏
页码:158 / 164
页数:7
相关论文
共 50 条
  • [41] On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques
    Sayeed, Sarwar
    Marco-Gisbert, Hector
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 331 - 344
  • [42] BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    Shi, Zhihui
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 136
  • [43] A Rule-based Mechanism for Event-Triggered Control of Nonlinear Systems
    Wang, Mengxi
    Liu, Tengfei
    Jiang, Zhong-Ping
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 1373 - 1378
  • [44] BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
    Park, Moon Chan
    Lee, Dong Hoon
    IEEE ACCESS, 2023, 11 : 4291 - 4305
  • [45] PROLEPSIS: Binary analysis and instrumentation of IoT software for control-flow integrity
    Forte, Valentina
    Maunero, Nicolo
    Prinetto, Paolo
    Roascio, Gianluca
    International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021, 2021,
  • [46] KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels
    Criswell, John
    Dautenhahn, Nathan
    Adve, Vikram
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 292 - 307
  • [47] Rule-based control of collaborative robots
    Li, Ge
    Lin, Kuo-chi
    Xia, Zheng
    ICAT 2006: 16TH INTERNATIONAL CONFERENCE ON ARTIFICIAL REALITY AND TELEXISTENCE - WORSHOPS, PROCEEDINGS, 2006, : 68 - +
  • [48] MODELING CONTROL IN RULE-BASED SYSTEMS
    VESTLI, M
    NORDBO, I
    SOLVBERG, A
    IEEE SOFTWARE, 1994, 11 (02) : 77 - 81
  • [49] Hardware-Assisted Control-Flow Integrity Enhancement for IoT Devices
    Wang, Weiyi
    Feng, Lang
    Shi, Zhiguo
    Zhuo, Cheng
    Chen, Jiming
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [50] Integrating Static Analyses for High-Precision Control-Flow Integrity
    Kasten, Florian
    Zieris, Philipp
    Horsch, Julian
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 419 - 434