首页> 外文期刊>Computers & Security >ROPSentry: Runtime defense against ROP attacks using hardware performance counters
【24h】

ROPSentry: Runtime defense against ROP attacks using hardware performance counters

机译:ROPSentry:使用硬件性能计数器的运行时防御ROP攻击

获取原文
获取原文并翻译 | 示例

摘要

AbstractReturn-Oriented Programming (ROP) is one of the most common techniques to exploit software vulnerabilities. However, existing defense techniques can be defeated by attackers, or suffer from high performance overhead. In this paper, we propose a defense framework, named ROPSentry, to detect ROP attacks at runtime. It is built on the observation that ROP exploits usually trigger different hardware events than normal programs generated by compilers. Hence, we leverage hardware performance counters to track such hardware events and analyze behavioral patterns of ROP attacks. ROPSentry has two approaches. TheROP-only defense approachdetects ROP attacks via capturing the patterns of ROP exploits, where we propose to sample the hardware performance counters at mispredicted return events instead of at every microinstruction for a low performance overhead. To further reduce performance overhead, we propose aself-adaptive defense approachto dynamically switch between low and high sampling rates. It detects the patterns of spraying attacks (i.e., one common ROP payload delivery technique) at a low sampling rate, and then switches to a high sampling rate for detecting the patterns of ROP exploits. Our evaluation on 11 real-world ROP exploits, 50 synthetically generated ROP exploits and 1000 benign websites has shown that, the ROP-only and self-adaptive approaches are effective in detecting ROP attacks with low performance overhead (11% and 1% respectively) as well as low false positive; and they significantly outperform the state-of-the-art techniques in terms of performance overhead without losing the detection accuracy.
机译: 摘要 面向返回的编程(ROP)是利用软件漏洞的最常见技术之一。但是,现有的防御技术可能会遭到攻击者的挫败,或遭受高性能开销。在本文中,我们提出了一个名为ROPSentry的防御框架,用于在运行时检测ROP攻击。它是基于观察到的,ROP漏洞通常会触发与编译器生成的普通程序不同的硬件事件。因此,我们利用硬件性能计数器来跟踪此类硬件事件并分析ROP攻击的行为模式。 ROPSentry有两种方法。 仅ROP防御方法通过捕获ROP漏洞利用的模式来检测ROP攻击,我们建议在错误的返回事件(而不是在每条微指令上)对硬件性能计数器进行采样,以降低性能高架。为了进一步降低性能开销,我们提出了一种自适应防御方法,可以在低采样率和高采样率之间动态切换。它以低采样率检测喷射攻击的模式(即一种常见的ROP有效载荷传递技术),然后切换到高采样率以检测ROP攻击的模式。我们对11种真实的ROP漏洞,50个综合生成的ROP漏洞和1000个良性网站​​的评估表明,仅ROP的方法和自适应方法可有效检测性能开销较低的ROP攻击(分别为11%和1%)以及较低的误报率;并且它们在性能开销方面明显优于最新技术,而不会丢失检测精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号