Control Flow Integrity for COTS Binaries.

SEC'13: Proceedings of the 22nd USENIX conference on Security(2013)

引用 189|浏览576
暂无评分
摘要
Control-Flow Integrity (CFI) has been recognized as an important low-level security property. Its enforcement can defeat most injected and existing code attacks, including those based on Return-Oriented Programming (ROP). Previous implementations of CFI have required compiler support or the presence of relocation or debug information in the binary. In contrast, we present a technique for applying CFI to stripped binaries on ×86/Linux. Ours is the first work to apply CFI to complex shared libraries such as glibc. Through experimental evaluation, we demonstrate that our CFI implementation is effective against control-flow hijack attacks, and eliminates the vast majority of ROP gadgets. To achieve this result, we have developed robust techniques for disassembly, static analysis, and transformation of large binaries. Our techniques have been tested on over 300MB of binaries (executables and shared libraries).
更多
查看译文
关键词
CFI implementation,ROP gadget,complex shared library,Control-Flow Integrity,Return-Oriented Programming,compiler support,control-flow hijack attack,debug information,existing code attack,experimental evaluation,COTS binary,control flow integrity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要