There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication
نویسندگان
چکیده
Despite the large number of proposed countermeasures against control-flow hijacking attacks, these attacks still pose a great threat for today’s applications. The problem with existing solutions is that they either provide incomplete probabilistic protection (e.g., stack canaries) or impose a high runtime overhead (e.g., bounds checking). In this paper, we show how the concept of program-part duplication can be used to protect against control-flow hijacking attacks and present two different instantiations of the duplication concept which protect against popular attack vectors. First, we use the duplication of functions to eliminate the need of return addresses and thus provide complete protection against attacks targeting a function’s return address. Then we demonstrate how the integrity of function pointers can be protected through the use of data duplication. We test the combined effectiveness of our two methods and experimentally show that they provide an almost complete protection against control-flow hijacking attacks with only a low runtime overhead in real-world applications.
منابع مشابه
Detecting and Preventing Control-Flow Hijacking Attacks in Commodity Software
Control-flow hijacking attacks allow an attacker to subvert a value that is loaded into the program counter of a running program, typically redirecting execution to his own injected code. Such attacks can be used to completely subvert a remote system, and can rapidly infect all vulnerable machines when used by a fast-spreading worm. Currently, users of commodity software must rely on the vendor...
متن کاملInvestigating the Effect of Education Based on the Health Belief Model on Safe Behavior Preventing Children's Injuries in Mothers with under 5-Years Children
Aims: Improving childrenchr('39')s health is one of the most important indicators of a communitychr('39')s health and preventing injuries in children requires safety. Therefore, the present study aimed to investigate the effect of theory-based education (Health Belief Model) on motherschr('39') safety behavior in preventing injuries from pediatric accidents. Materials & Methods: This semi-expe...
متن کاملVTint: Protecting Virtual Function Tables' Integrity
In the recent past, a number of approaches have been proposed to protect certain types of control data in a program, such as return addresses saved on the stack, rendering most traditional control flow hijacking attacks ineffective. Attackers, however, can bypass these defenses by launching advanced attacks that corrupt other data, e.g., pointers indirectly used to access code. One of the most ...
متن کاملVTrust: Regaining Trust on Virtual Calls
Virtual function calls are one of the most popular control-flow hijack attack targets. Compilers use a virtual function pointer table, called a VTable, to dynamically dispatch virtual function calls. These VTables are read-only, but pointers to them are not. VTable pointers reside in objects that are writable, allowing attackers to overwrite them. As a result, attackers can divert the control-f...
متن کاملPreventing Injuries in Workers: The Role of Management Practices in Decreasing Injuries Reporting
BackgroundResearchers have found that management safety practices may predict occupational injuries and psychological distresses in the workplace. The present study examined the perception of management safety practices related to injuries reporting and its dimensions among workers of Isfahan Steel Company (ESCO). Methods A self-administered anonymous survey was distributed to 189 workers. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012