首页> 外文期刊>Computers & Security >DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton
【24h】

DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton

机译:DOPdefender:一种基于数据感知自动机来阻止面向数据的编程攻击的方法

获取原文
获取原文并翻译 | 示例
       

摘要

In recent years, non-control data attacks have become a popular topic in the field of network security. These attacks, such as data-oriented programming (DOP), do not aim to circumvent the control-flow integrity (CFI) protections; rather, they need corrupt only the security-critical non-control data of the target program. Non-control data attacks have been shown to achieve Turing-complete computation. In this paper, we build a non-control data attack description model and analyse feasible defence strategies. We present a new program behaviour model, i.e., the data-aware finite-state automaton (dFSA). Based on the dFSA, we propose the DOPdefender method, which is a method of defending against non-control data attacks. DOPdefender monitors the target process and is aware of the security-critical non-control data that are expected to be operated at runtime, thus validating the legality of the operation on the security-critical non-control data. DOPdefender can prevent adversaries from corrupting the security-critical non-control data of the target program and defend against existing non-control data attacks. We evaluate our method on a Linux operating system. An effectiveness test and a performance test indicate the effectiveness of DOPdefender in thwarting non-control data attacks with a 28.4% runtime overhead on average for CPU-intensive programs and a 13.5% runtime overhead on average for I/O-intensive programs. In the Limitations Section, we discuss a solution to making our method scalable for large-scale programs under some guiding information. (C) 2018 Elsevier Ltd. All rights reserved.
机译:近年来,非控制数据攻击已成为网络安全领域的热门话题。这些攻击,例如面向数据的编程(DOP),并非旨在绕过控制流完整性(CFI)保护。相反,他们只需要破坏目标程序的对安全性至关重要的非控制数据。非控制数据攻击已被证明可以实现图灵完备的计算。在本文中,我们建立了非控制性数据攻击描述模型,并分析了可行的防御策略。我们提出了一种新的程序行为模型,即数据感知的有限状态自动机(dFSA)。基于dFSA,我们提出了DOPdefender方法,这是一种防御非控制数据攻击的方法。 DOPdefender监视目标进程,并知道预期在运行时进行操作的对安全至关重要的非控制数据,从而验证对对安全至关重要的非控制数据进行操作的合法性。 DOPdefender可以防止对手破坏目标程序对安全性至关重要的非控制数据,并防御现有的非控制数据攻击。我们在Linux操作系统上评估我们的方法。有效性测试和性能测试表明,DOPdefender可以有效地阻止非控制数据攻击,其中CPU密集型程序的平均运行时间开销为28.4%,I / O密集型程序的平均运行时间开销为13.5%。在“限制”部分中,我们讨论了一种在某些指导信息下使我们的方法可扩展用于大规模程序的解决方案。 (C)2018 Elsevier Ltd.保留所有权利。

著录项

  • 来源
    《Computers & Security》 |2019年第3期|94-106|共13页
  • 作者单位

    State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China;

    State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China;

    State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China;

    State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China;

    State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Non-control data attacks; DOP; Security-critical non-control data; dFSA; DOPdefender;

    机译:非控制数据攻击;DOP;对安全至关重要的非控制数据;dFSA;DOPdefender;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号