首页> 外文期刊>International Journal of Applied Engineering Research >Improved Technique for Verification of Call-return Flow Integrity for Compiler-based Defense against Return-oriented Programming Attacks
【24h】

Improved Technique for Verification of Call-return Flow Integrity for Compiler-based Defense against Return-oriented Programming Attacks

机译:改进技术,用于验证呼叫流程完整性,用于对基于返回的编程攻击的基于编译器的防御

获取原文
获取原文并翻译 | 示例
           

摘要

Return-oriented programming (ROP) attacks have been increasing in number recently. ROP is an exploitation technique that can bypass non-executable page protection methods by using existing codes within benign programs or modules. There has been much research on defense methods against ROP attacks, but most of them have high performance overhead (dynamic instrumentation approach) or high time complexity (compiler-based approach) in terms of the detection of gadgets. The ROP defense technique recently proposed by Lee et al. has overcome the limitations of the compiler-based approach, and has further proved its efficiency. Their defense technique performs calculations with a single global variable immediately before the execution of each ret instruction (-1) and at the resetting position (+1). Moreover, their defense technique achieved O(1) in detection time complexity by detecting gadgets within only two executions. In their experiment, the performance overhead was 1.62% and the file size overhead was 4.60%. To verify the control-flow integrity (CFI), their defense scheme was performed to simplify codes by computing a special variable, check_value. However, the code is inefficient because it performs the same computation on all call and ret instructions. In this paper, we propose an ROP defense method to verify the CFI through concentrated functions. We improved Lee et al.'s method by allowing a specific function to separately execute the calculation of the check_value. Our experiment could reduce the file size overhead by approximately 40% while maintaining the efficiency, detection time complexity, and performance presented in Lee et al.'s defense technique.
机译:以返回返回的编程(ROP)攻击最近在数量上升。 ROP是一种开发技术,可以通过使用良性程序或模块内的现有代码来绕过非可执行的页面保护方法。对ROP攻击的防御方法有很多研究,但大多数在所述小工具检测方面具有高性能开销(动态仪表方法)或高时间复杂性(基于编译的方法)。李等人最近提出的ROP防御技术。克服了基于编译的方法的局限性,并进一步证明了其效率。他们的防御技术在执行每个RET指令(-1)和复位位置之前,立即使用单个全局变量进行计算,并在重置位置(+1)。此外,通过检测仅两次执行内的小工具来实现其防御技术在检测时间复杂度中实现了O(1)。在实验中,性能开销为1.62%,文件大小开销为4.60%。为了验证控制流程完整性(CFI),执行其防御方案以通过计算特殊变量Check_Value来简化代码。但是,代码效率低,因为它对所有呼叫和RET指令执行相同的计算。在本文中,我们提出了一种ROP防御方法,通过集中功能来验证CFI。我们通过允许特定函数分别执行Check_Value的计算来改进Lee等人。我们的实验可以减少文件大小超过40%,同时保持李等人的效率,检测时间复杂度和表现。的防御技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号