On Detecting Code Reuse Attacks

被引:1
|
作者
Kosolapov, Y. V. [1 ]
机构
[1] Southern Fed Univ, Rostov Na Donu 344006, Russia
关键词
code reuse; software vulnerabilities;
D O I
10.3103/S0146411620070111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against execution of code in the stack, which is implemented on the hardware and software levels in modern information systems. The attacks are based on finding suitable sections of executable code-gadgets-in the vulnerable program and linking these gadgets into chains. The article proposes a method to protect applications against code reuse attacks. The method is based on detecting properties that distinguish between chains of gadgets and typical chains of legitimate program basic blocks. The appearance of an atypical chain of basic blocks during program execution may indicate the execution of a malicious code. One of the properties of a chain of gadgets is that at the end of the chain a special processor instruction used to call a function of the operating system is executed. Experiments are carried out for the x86/64 Linux operating system which show the importance of this property for detecting malicious code execution. An algorithm for identifying atypical chains is developed which makes it possible to detect all currently known code reuse techniques.
引用
收藏
页码:573 / 583
页数:11
相关论文
共 50 条
  • [21] Timely address space rerandomization for resisting code reuse attacks
    Chen, Xiaoquan
    Xue, Rui
    Wu, Chuankun
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
  • [22] Signature-Based Protection from Code Reuse Attacks
    Kayaalp, Mehmet
    Schmitt, Timothy
    Nomani, Junaid
    Ponomarev, Dmitry
    Abu Ghazaleh, Nael
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 533 - 546
  • [23] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification
    Gionta, Jason
    Enck, William
    Larsen, Per
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
  • [24] Accurately detecting source code of attacks that increase privilege
    MIT Lincoln Laboratory, 244 Wood Street, Lexington
    MA
    02420-9185, United States
    Lect. Notes Comput. Sci., (104-116):
  • [25] Mitigating Code-Reuse Attacks with Control-Flow Locking
    Bletsch, Tyler
    Jiang, Xuxian
    Freeh, Vince
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362
  • [26] MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles
    Habibi, Javid
    Gupta, Aditi
    Carlson, Stephen
    Panicker, Ajay
    Bertino, Elisa
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 642 - 652
  • [27] Finding dispatcher gadgets for jump oriented programming code reuse attacks
    Erdodi, L.
    2013 IEEE 8TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI 2013), 2013, : 321 - 325
  • [28] μShield Configurable Code-Reuse Attacks Mitigation For Embedded Systems
    Abbasi, Ali
    Wetzels, Jos
    Bokslag, Wouter
    Zambon, Emmanuele
    Etalle, Sandro
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 694 - 709
  • [29] Defending AUTOSAR Safety Critical Systems Against Code Reuse Attacks
    Nasser, Ahmad
    Ma, Di
    PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19), 2019, : 15 - 18
  • [30] Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach
    Zhang, Zhijiao
    Lu, Yashuai
    Chen, Yu
    Lu, Yongqiang
    Shi, Yuanchun
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 431 - 445