HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks

被引:0
|
作者
Xin Huang
Fei Yan
Liqiang Zhang
Kai Wang
机构
[1] Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering
来源
关键词
Gadgets insertion; Deception; Control flow; Last Branch Record;
D O I
暂无
中图分类号
学科分类号
摘要
Code reuse attacks such as Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP) are the prevalent attack techniques which reuse code snippets named gadget in vulnerable applications and hijack control flow to achieve malicious behaviors. Existing defense techniques for code reuse attacks attempt to prevent illegal control flow transition or make locating gadgets a hard work. However, decades of the arms race proved the ability to detect and prevent advanced attacks is still outdated. In this paper, we propose HoneyGadget, a deception based approach for detecting code reuse attacks. HoneyGadget works by inserting honey gadgets into the application as decoys and keep track of their addresses once the application is loaded. During the execution phase, HoneyGadget traces the execution records using Last Branch Record (LBR), compares the LBR records with the maintained address list, and alarms code reuse attacks if some records match. HoneyGadget not only prevents code reuse attacks, but also provides LBR records for researchers to analyze patterns of these attacks. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can capture code reuse attacks effectively and only incurs a modest performance overhead.
引用
收藏
页码:269 / 283
页数:14
相关论文
共 50 条
  • [41] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification
    Gionta, Jason
    Enck, William
    Larsen, Per
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
  • [42] A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis
    Li, Muhai
    Li, Ming
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3774 - 3778
  • [43] A rule-based approach for detecting heartbleed cyber attacks
    Amodei, A.
    Capriglione, D.
    Ferrigno, L.
    Miele, G.
    Tomasso, G.
    Cerro, G.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENTS & NETWORKING (M&N 2022), 2022,
  • [44] Accurately detecting source code of attacks that increase privilege
    MIT Lincoln Laboratory, 244 Wood Street, Lexington
    MA
    02420-9185, United States
    Lect. Notes Comput. Sci., (104-116):
  • [45] Event-Based State Estimation Against Deception Attacks: A Detection-Based Approach
    Zhao, Chang
    Lin, Hong
    Li, Yuman
    Liang, Shi
    Lam, James
    IEEE SENSORS JOURNAL, 2023, 23 (19) : 23020 - 23029
  • [46] A framework for detecting network-based code injection attacks targeting windows and UNIX
    Andersson, S
    Clark, A
    Mohay, G
    Schatz, B
    Zimmermann, J
    21st Annual Computer Security Applications Conference, Proceedings, 2005, : 41 - 50
  • [47] Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 3947 - 3962
  • [48] Mitigating Code-Reuse Attacks with Control-Flow Locking
    Bletsch, Tyler
    Jiang, Xuxian
    Freeh, Vince
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 353 - 362
  • [49] Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph
    Sun, Xin
    Zhongyang, Yibing
    Xin, Zhi
    Mao, Bing
    Xie, Li
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 142 - 155
  • [50] An unsupervised approach for detecting DDoS attacks based on traffic-based metrics
    Lu, W
    Traore, I
    2005 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2005, : 462 - 465