【24h】

Fine-Grained Control-Flow Integrity Through Binary Hardening

机译:通过二元硬化进行细粒控制流动完整性

获取原文

摘要

Applications written in low-level languages without type or memory safety are prone to memory corruption. Attackers gain code execution capabilities through memory corruption despite all currently deployed defenses. Control-Flow Integrity (CFI) is a promising security property that restricts indirect control-flow transfers to a static set of well-known locations. We present Lockdown, a modular, fine-grained CFI policy that protects binary-only applications and libraries without requiring source-code. Lockdown adaptively discovers the control-flow graph of a running process based on the executed code. The sandbox component of Lock-down restricts interactions between different shared objects to imported and exported functions by enforcing fine-grained CFI checks using information from a trusted dynamic loader. A shadow stack enforces precise integrity for function returns. Our prototype implementation shows that Lockdown results in low performance overhead and a security analysis discusses any remaining gadgets.
机译:以低级别语言编写的应用程序没有类型或内存安全的易于内存损坏。攻击者通过内存损坏,尽管目前部署的防御,但攻击者通过内存损坏获得代码执行功能。控制流程完整性(CFI)是一个有希望的安全性,限制间接控制流传输到静态众所周知的位置集。我们呈现锁定,模块化,细粒度的CFI策略,可在不需要源代码的情况下保护二进制应用程序和库。锁定自适应地发现基于执行的代码的运行过程的控制流程图。锁定的沙箱组件限制了不同共享对象之间的交互来通过从可信动态加载器的信息执行信息来强制使用微粒CFI检查来导入和导出功能。 Shadow堆栈为函数返回执行了精确的完整性。我们的原型实现表明,锁定导致低性能开销,安全性分析讨论了任何剩余的小工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号