HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks

被引:0
|
作者
Xin Huang
Fei Yan
Liqiang Zhang
Kai Wang
机构
[1] Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering
来源
关键词
Gadgets insertion; Deception; Control flow; Last Branch Record;
D O I
暂无
中图分类号
学科分类号
摘要
Code reuse attacks such as Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP) are the prevalent attack techniques which reuse code snippets named gadget in vulnerable applications and hijack control flow to achieve malicious behaviors. Existing defense techniques for code reuse attacks attempt to prevent illegal control flow transition or make locating gadgets a hard work. However, decades of the arms race proved the ability to detect and prevent advanced attacks is still outdated. In this paper, we propose HoneyGadget, a deception based approach for detecting code reuse attacks. HoneyGadget works by inserting honey gadgets into the application as decoys and keep track of their addresses once the application is loaded. During the execution phase, HoneyGadget traces the execution records using Last Branch Record (LBR), compares the LBR records with the maintained address list, and alarms code reuse attacks if some records match. HoneyGadget not only prevents code reuse attacks, but also provides LBR records for researchers to analyze patterns of these attacks. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can capture code reuse attacks effectively and only incurs a modest performance overhead.
引用
收藏
页码:269 / 283
页数:14
相关论文
共 50 条
  • [31] Physical Unclonable Functions-based Linear Encryption against Code Reuse Attacks
    Qiu, Pengfei
    Lyu, Yongqiang
    Zhang, Jiliang
    Wang, Xingwei
    Zhai, Di
    Wang, Dongsheng
    Qu, Gang
    2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [32] A Bispectrum-based Approach for Detecting Deception using EEG Signals
    Alazrai, Rami
    Alqasem, Faisal
    Alaarag, Saqr
    Yousef, Khalil M. Ahmad
    Daoud, Mohammad I.
    2018 IEEE 20TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2018,
  • [33] Hurdle: Securing Jump Instructions Against Code Reuse Attacks
    DeLozier, Christian
    Lakshminarayanan, Kavya
    Pokam, Gilles
    Devietti, Joseph
    TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), 2020, : 653 - 666
  • [34] Code Reuse Attacks in PHP: Automated POP Chain Generation
    Dahse, Johannes
    Krein, Nikolai
    Holz, Thorsten
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 42 - 53
  • [35] Protecting Instruction Set Randomization from Code Reuse Attacks
    Guanciale, Roberto
    SECURE IT SYSTEMS, 2018, 11252 : 421 - 436
  • [36] SGXPecial: Specializing SGX Interfaces against Code Reuse Attacks
    Mishra, Shachee
    Polychronakis, Michalis
    PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 48 - 54
  • [37] ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks
    Graziano, Mariano
    Balzarotti, Davide
    Zidouemba, Alain
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 47 - 58
  • [38] Timely address space rerandomization for resisting code reuse attacks
    Chen, Xiaoquan
    Xue, Rui
    Wu, Chuankun
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
  • [39] An XML approach for legacy code reuse
    Bi, Y
    Hull, MEC
    Nicholl, PN
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 61 (02) : 77 - 89
  • [40] Detecting Deception in Cyber Conflict: A Strategic Approach
    Chen, Jim
    Duvall, Gilliam
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 78 - 85