【24h】

Fine-Grained Control-Flow Integrity Through Binary Hardening

机译:通过二进制强化实现细粒度的控制流完整性

获取原文

摘要

Applications written in low-level languages without type or memory safety are prone to memory corruption. Attackers gain code execution capabilities through memory corruption despite all currently deployed defenses. Control-Flow Integrity (CFI) is a promising security property that restricts indirect control-flow transfers to a static set of well-known locations. We present Lockdown, a modular, fine-grained CFI policy that protects binary-only applications and libraries without requiring source-code. Lockdown adaptively discovers the control-flow graph of a running process based on the executed code. The sandbox component of Lock-down restricts interactions between different shared objects to imported and exported functions by enforcing fine-grained CFI checks using information from a trusted dynamic loader. A shadow stack enforces precise integrity for function returns. Our prototype implementation shows that Lockdown results in low performance overhead and a security analysis discusses any remaining gadgets.
机译:用低级语言编写的没有类型或内存安全性的应用程序容易发生内存损坏。尽管当前部署了所有防御措施,但攻击者仍会通过内存损坏来获得代码执行功能。控制流完整性(CFI)是一种很有前途的安全属性,它将间接控制流传输限制到一组静态的已知位置。我们介绍了Lockdown,这是一种模块化的细粒度CFI策略,无需源代码即可保护仅二进制的应用程序和库。锁定根据执行的代码自适应地发现正在运行的进程的控制流图。锁定的沙箱组件通过使用来自受信任的动态加载器的信息来执行细粒度的CFI检查,从而将不同共享对象之间的交互限制为导入和导出的功能。影子堆栈对函数返回强制执行精确的完整性。我们的原型实现显示出Lockdown导致较低的性能开销,并且安全分析将讨论所有剩余的小工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号