On Detecting Code Reuse Attacks

被引:1
|
作者
Kosolapov, Y. V. [1 ]
机构
[1] Southern Fed Univ, Rostov Na Donu 344006, Russia
关键词
code reuse; software vulnerabilities;
D O I
10.3103/S0146411620070111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against execution of code in the stack, which is implemented on the hardware and software levels in modern information systems. The attacks are based on finding suitable sections of executable code-gadgets-in the vulnerable program and linking these gadgets into chains. The article proposes a method to protect applications against code reuse attacks. The method is based on detecting properties that distinguish between chains of gadgets and typical chains of legitimate program basic blocks. The appearance of an atypical chain of basic blocks during program execution may indicate the execution of a malicious code. One of the properties of a chain of gadgets is that at the end of the chain a special processor instruction used to call a function of the operating system is executed. Experiments are carried out for the x86/64 Linux operating system which show the importance of this property for detecting malicious code execution. An algorithm for identifying atypical chains is developed which makes it possible to detect all currently known code reuse techniques.
引用
收藏
页码:573 / 583
页数:11
相关论文
共 50 条
  • [1] On Detecting Code Reuse Attacks
    Y. V. Kosolapov
    Automatic Control and Computer Sciences, 2020, 54 : 573 - 583
  • [2] Detecting Code Reuse Attacks with Branch Prediction
    Lee, Yongsuk
    Lee, Gyungho
    COMPUTER, 2018, 51 (04) : 40 - 47
  • [3] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Huang, Xin
    Yan, Fei
    Zhang, Liqiang
    Wang, Kai
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (02) : 269 - 283
  • [4] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Xin Huang
    Fei Yan
    Liqiang Zhang
    Kai Wang
    Information Systems Frontiers, 2021, 23 : 269 - 283
  • [5] Detecting Code Reuse Attacks with a Model of Conformant Program Execution
    Jacobson, Emily R.
    Bernat, Andrew R.
    Williams, William R.
    Miller, Barton P.
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 452 - 453
  • [6] Code Shredding: Byte-Granular Randomization of Program Layout for Detecting Code-Reuse Attacks
    Shioji, Eitaro
    Kawakoya, Yuhei
    Iwamura, Makoto
    Hariu, Takeo
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 309 - 318
  • [7] Marlin: Mitigating Code Reuse Attacks Using Code Randomization
    Gupta, Aditi
    Habibi, Javid
    Kirkpatrick, Michael S.
    Bertino, Elisa
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 326 - 337
  • [8] Defensing Code Reuse Attacks Using Live Code Randomization
    Zhang G.-M.
    Li Q.-B.
    Zeng G.-Y.
    Zhao Y.-T.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2772 - 2790
  • [9] A Method for Analyzing Code-Reuse Attacks
    A. V. Vishnyakov
    A. R. Nurmukhametov
    Sh. F. Kurmangaleev
    S. S. Gaisaryan
    Programming and Computer Software, 2019, 45 : 473 - 484
  • [10] A Method for Analyzing Code-Reuse Attacks
    Vishnyakov, A. V.
    Nurmukhametov, A. R.
    Kurmangaleev, Sh F.
    Gaisaryan, S. S.
    PROGRAMMING AND COMPUTER SOFTWARE, 2019, 45 (08) : 473 - 484