Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table

被引:0
|
作者
Fu, Jianming [1 ,2 ]
Lin, Yan [1 ,2 ]
Zhang, Xu [1 ,2 ]
机构
[1] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan, Peoples R China
[2] Wuhan Univ, Comp Sch, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
function-level randomization; code reuse attack; symbol table; binary rewriting;
D O I
10.1109/TrustCom.2016.88
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Address space randomization is an attractive way to counter against code-reuse attack. However, traditional Address Space Layout Randomization (ASLR) just randomizes the base address of a binary, whose relative address is not changed. So attackers can still use the fixed relative address to construct gadgets needed by code-reuse attack through information leakage. Although many fine-grained randomization approaches have been proposed recently, most of them rely on additional information, such as source code and symbol table. To overcome these limitations, we propose a function-level randomization approach, called Bin-FR, which performs function permutation and NOP instruction insertion randomly between functions without the support of symbol table through binary rewriting. Bin-FR is a fine-grained randomization approach, which increases the difficulty for attackers to predict the space layout of running binaries. Finally, we have implemented Bin-FR based on the disassembly tool Capstone on x86_64 64-bit version of Kali. Its experimental results show that Bin-FR can identify functions accurately and counter against code-reuse attack effectively, moreover, the runtime overhead of Bin-FR is negligible.
引用
收藏
页码:394 / 401
页数:8
相关论文
共 9 条
  • [1] It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
    Crane, Stephen
    Volckaert, Stijn
    Schuster, Felix
    Liebchen, Christopher
    Larsen, Per
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Holz, Thorsten
    De Sutter, Bjorn
    Franz, Michael
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 243 - 255
  • [2] Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation
    Wang, Xiaoke
    Hui, Tao
    Zhao, Lei
    Cheng, Yueqiang
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 934 - 946
  • [3] AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level
    Lin, Kunli
    Xia, Haojun
    Zhang, Kun
    Tu, Bibo
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 117 - 124
  • [4] Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
    Guo, Yingjie
    Chen, Liwei
    Shi, Gang
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [5] Passivity-Based Attack Detection and Mitigation with Switching Adaptive Controller and Quadratic Storage Function
    Purohit, Pushkal
    Jain, Anoop
    2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 2403 - 2408
  • [7] A UNIVERSAL POSTPROCESSOR OF GENERAL TABLE-TILTING TYPE OF FIVE-AXIS MACHINE TOOLS WITHOUT ROTATIONAL TOOL CENTER POINT FUNCTION FOR ACTUAL NC CODE GENERATION
    Fu, Guoqiang
    Gao, Hongli
    Gu, Tengda
    PROCEEDINGS OF THE ASME 13TH INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE, 2018, VOL 4, 2018,
  • [8] A Physical Unclonable Function With Bit Error Rate < 2.3 $\times$ 10-8 Based on Contact Formation Probability Without Error Correction Code
    Jeon, Duhyun
    Baek, Jong Hak
    Kim, Yong-Duck
    Lee, Jaeseong
    Kim, Dong Kyue
    Choi, Byong-Deok
    IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2020, 55 (03) : 805 - 816
  • [9] Easy Jmol Web Pages Using the Jmol Export to Web Function: A Tool for Creating Interactive Web-Based Instructional Resources and Student Projects with Live 3-D Images of Molecules without Writing Computer Code
    Gutow, Jonathan H.
    JOURNAL OF CHEMICAL EDUCATION, 2010, 87 (06) : 652 - 653