首页> 外文会议>International Conference on Science of Cyber Security >Honey Gad get: A Deception Based ROP Detection Scheme
【24h】

Honey Gad get: A Deception Based ROP Detection Scheme

机译:蜂蜜gad:一种基于欺骗的ROP检测方案

获取原文

摘要

Return-Oriented Programming (ROP) is a robust attack which has been proven to be Turing-complete. ROP reuses code segments named gadget in vulnerable applications and modifies control flow to achieve malicious attacks. Existing defense techniques for code reuse attacks attempt to restrict the policy of control flow transfer (e.g. CFI) or make locating gadgets a hard work (e.g. ASLR). However, decades of the arm race proved the ability to detect up-to-date attacks remains the Achille's heel. In honeypot, a general pattern for operators is spreading honeytokens and hunting spammers by capturing their malicious behavior. In order to capture the attack pattern of code reuse attacks, we present a novel deception based ROP detection model named Honey-Gadget. HoneyGadget inserts various types of honey gadgets as tokens to some specific points of binary files where normal control flow would not reach and record their places once the application is loaded. During the execution, HoneyGadget uses Last Branch Record (LBR) to trace execution records. On performing a sensitive function call, HoneyGadget compares LBR records with the maintained address list, and terminates the program immediately if some records match. Since these honey gadgets will not be executed by normal control flow, there must be a ROP attack. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can (1) capture ROP attacks actively and (2) incurs an acceptable overhead of 7.61%.
机译:以返回返回的编程(ROP)是一种强大的攻击,已被证明是完成的。 ROP重用代码段名为Gadget的易受攻击的应用程序,并修改控制流以实现恶意攻击。用于代码重用攻击的现有防御技术尝试限制控制流传输(例如CFI)的策略,或者使努力工作(例如ASLR)定位小工具。然而,几十年的ARM比赛证明了检测最新攻击的能力仍然是Achille的脚后跟。在蜜罐中,运营商的一般模式是通过捕获恶意行为来蔓延蜂窝和狩猎垃圾邮件发送者。为了捕获代码重用攻击的攻击模式,我们提出了一种基于新的基于欺骗性的ROP检测模型,名为Honey-Gadget。 Honeygadget将各种类型的蜂蜜小工具作为令牌中的一些特定点作为令牌的二进制文件,一旦加载应用程序,就不会达到并记录其位置。在执行过程中,Honeygadget使用最后分支记录(LBR)来跟踪执行记录。在执行敏感函数调用时,Honeygadget将LBR记录与维护的地址列表进行比较,如果某些记录匹配,请立即终止该程序。由于这些蜂蜜小工具不会被正常控制流程执行,因此必须有一个ROP攻击。我们开发了一个完全运行的蜜饼原型。我们的评价结果​​表明,蜜胶可以(1)积极捕捉ROP攻击,(2)招收可接受的开销7.61%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号