On Detecting Code Reuse Attacks

被引:1
|
作者
Kosolapov, Y. V. [1 ]
机构
[1] Southern Fed Univ, Rostov Na Donu 344006, Russia
关键词
code reuse; software vulnerabilities;
D O I
10.3103/S0146411620070111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against execution of code in the stack, which is implemented on the hardware and software levels in modern information systems. The attacks are based on finding suitable sections of executable code-gadgets-in the vulnerable program and linking these gadgets into chains. The article proposes a method to protect applications against code reuse attacks. The method is based on detecting properties that distinguish between chains of gadgets and typical chains of legitimate program basic blocks. The appearance of an atypical chain of basic blocks during program execution may indicate the execution of a malicious code. One of the properties of a chain of gadgets is that at the end of the chain a special processor instruction used to call a function of the operating system is executed. Experiments are carried out for the x86/64 Linux operating system which show the importance of this property for detecting malicious code execution. An algorithm for identifying atypical chains is developed which makes it possible to detect all currently known code reuse techniques.
引用
收藏
页码:573 / 583
页数:11
相关论文
共 50 条
  • [41] SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks
    Kayaalp, Mehmet
    Schmitt, Timothy
    Nomani, Junaid
    Ponomarev, Dmitry
    Abu-Ghazaleh, Nael
    19TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA2013), 2013, : 258 - 269
  • [42] ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
    Lu, Kangjie
    Song, Chengyu
    Lee, Byoungyoung
    Chung, Simon P.
    Kim, Taesoo
    Lee, Wenke
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 280 - 291
  • [43] Bee Master: Detecting Host-Based Code Injection Attacks
    Barabosch, Thomas
    Eschweiler, Sebastian
    Gerhards-Padilla, Elmar
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 235 - 254
  • [44] Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
    An, Zhenliang
    Wang, Weike
    Li, Wenxin
    Li, Senyang
    Zhang, Dexue
    MICROMACHINES, 2023, 14 (08)
  • [45] The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
    Biondo, Andrea
    Conti, Mauro
    Davi, Lucas
    Frassetto, Tommaso
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1213 - 1227
  • [46] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024,
  • [47] Physical Unclonable Functions-based Linear Encryption against Code Reuse Attacks
    Qiu, Pengfei
    Lyu, Yongqiang
    Zhang, Jiliang
    Wang, Xingwei
    Zhai, Di
    Wang, Dongsheng
    Qu, Gang
    2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [48] MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
    Salehi, Majid
    Hughes, Danny
    Crispo, Bruno
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 33 - 40
  • [49] Detecting and Characterizing Developer Behavior Following Opportunistic Reuse of Code Snippets from the Web
    Ciborowska, Agnieszka
    Kraft, Nicholas A.
    Damevski, Kostadin
    2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, : 94 - 97
  • [50] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors
    Oh, Hyunyoung
    Cho, Yeongpil
    Paek, Yunheung
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 7287 - 7314