Source code based protection against CRAs

نویسنده

  • Claudia Eckert
چکیده

As the threat potential of Code-Reuse Attacks (CRAs) is rising we want to develop a tool that can mitigate such state-of-the-art attacks (e.g., the attack dubbed Counterfeit Object-Oriented Programming (COOP)). This attack is particularly hard to defend against since traditional Control Flow Integrity (CFI) approaches are useless. Based on source code recompilation techniques we want to harden the application binary in such a manner that it becomes very hard for an attacker to perform his attack. At least three types of binary checks will be inserted in the binary (e.g., number of parameters and types, void function were non void was expected and vice-versa, etc). First, parameter counting and type for caller/callees pairs will be derived based on a precise per function Control Flow Graph (CFG) analysis. Second, checks for caller/callee pairs will be added in order to avoid calling non void functions were actually void function were expected and vice-versa. Third, checks based on the virtual and non virtual class hierarchy (obtained for free from LLVM compiler framework) can be derived and enforced. Additionally, the approach [4] based on class interleaving can be improved whit diferenciating between virtual and normal class hierarchy or complemented whith checks which are a mix of the interleaved class hierarchy and function parameter types, number and return values (void or non-void). These three approaches will be a refinement of previous defensive source code based strategies against CRAs and will complement existing source code level techniques. For example parameter type hardening will help to reduce the set of caller/callee pairs checks thus increasing the performance of our approach by reducing the number of checks that need to be performed. The tool will be implemented as one or more LLVM passes and will be tested with real CRAs for Linux/Windows OSs. Additionally, for completeness reasons we will test the tool (by recompiling) with a series of server applications, web browsers and SPEC CPU 2006 benchmark w.r.t. performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

Practical Integer Overflow Prevention

Integer overflows in commodity software are a main source for software bugs, which can result in exploitable memory corruption vulnerabilities and may eventually contribute to powerful software based exploits, i.e., code reuse attacks (CRAs). In this paper, we present INTGUARD, a symbolic execution based tool that can repair integer overflows with high-quality source code repairs. Specifically,...

متن کامل

PUF-Based Software Protection for Low-End Embedded Devices

In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable targets for software piracy and software manipulation. Aggravating this situation, low-end embedded devices typically lack secure hardware to effectively protect against such attacks. In th...

متن کامل

Designed free-lead composite shields for diagnostic medicine radiation fields by using MCNPX code

 Introduction: Nowadays, applications of free-lead radiation shields are increased specially for weighting factor and toxicity of lead elements. Although touching the lead may be results in the nervousand blood system of body, it is not exactly proven yet. Protective measures are the fundamental parts of radiation protection. On the other hand, high weighting factor of lead sh...

متن کامل

Simulation of gamma-ray gamma rays by composite shields compared to the lead protection using the MCNPX code

In this study, cobalt 60 with a mean energy of (1.25 Mev) was used as a photonic source to investigate the effect of decreasing gamma-ray intensity by materials and polymer composite using MCNPX code. First, we investigated the effect of thickness and density on the reduction of gamma ray intensity, and then the comparison between the lead protector, tungsten and polymer composite in several th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016