HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks

被引:0
|
作者
Xin Huang
Fei Yan
Liqiang Zhang
Kai Wang
机构
[1] Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering
来源
关键词
Gadgets insertion; Deception; Control flow; Last Branch Record;
D O I
暂无
中图分类号
学科分类号
摘要
Code reuse attacks such as Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP) are the prevalent attack techniques which reuse code snippets named gadget in vulnerable applications and hijack control flow to achieve malicious behaviors. Existing defense techniques for code reuse attacks attempt to prevent illegal control flow transition or make locating gadgets a hard work. However, decades of the arms race proved the ability to detect and prevent advanced attacks is still outdated. In this paper, we propose HoneyGadget, a deception based approach for detecting code reuse attacks. HoneyGadget works by inserting honey gadgets into the application as decoys and keep track of their addresses once the application is loaded. During the execution phase, HoneyGadget traces the execution records using Last Branch Record (LBR), compares the LBR records with the maintained address list, and alarms code reuse attacks if some records match. HoneyGadget not only prevents code reuse attacks, but also provides LBR records for researchers to analyze patterns of these attacks. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can capture code reuse attacks effectively and only incurs a modest performance overhead.
引用
收藏
页码:269 / 283
页数:14
相关论文
共 50 条
  • [1] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Huang, Xin
    Yan, Fei
    Zhang, Liqiang
    Wang, Kai
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (02) : 269 - 283
  • [2] On Detecting Code Reuse Attacks
    Kosolapov, Y. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 573 - 583
  • [3] On Detecting Code Reuse Attacks
    Y. V. Kosolapov
    Automatic Control and Computer Sciences, 2020, 54 : 573 - 583
  • [4] Detecting Code Reuse Attacks with Branch Prediction
    Lee, Yongsuk
    Lee, Gyungho
    COMPUTER, 2018, 51 (04) : 40 - 47
  • [5] Detecting Code Reuse Attacks with a Model of Conformant Program Execution
    Jacobson, Emily R.
    Bernat, Andrew R.
    Williams, William R.
    Miller, Barton P.
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 452 - 453
  • [6] HoneyGadget: A Deception Based ROP Detection Scheme
    Huang, Xin
    Yan, Fei
    Zhang, Liqiang
    Wang, Kai
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 121 - 135
  • [7] Code Shredding: Byte-Granular Randomization of Program Layout for Detecting Code-Reuse Attacks
    Shioji, Eitaro
    Kawakoya, Yuhei
    Iwamura, Makoto
    Hariu, Takeo
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 309 - 318
  • [8] A Technique Preventing Code Reuse Attacks Based on RISC Processor
    Li, Yang
    Dai, Zi-bin
    Li, Jun-wei
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND NETWORK TECHNOLOGY (CCNT 2018), 2018, 291 : 96 - 102
  • [9] Defending Code Reuse Attacks Based on Running Characteristics Monitoring
    Zhang G.-M.
    Li Q.-B.
    Zhang P.
    Cheng S.-J.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (11): : 3518 - 3534
  • [10] Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach
    Zhang, Zhijiao
    Lu, Yashuai
    Chen, Yu
    Lu, Yongqiang
    Shi, Yuanchun
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 431 - 445