Defending Against ROP Attacks with Nearly Zero Overhead

被引:0
|
作者
Qin, Peng [1 ,2 ]
Tan, Cheng [1 ,2 ]
Zhao, Lei [1 ,2 ]
Cheng, Yueqiang [3 ]
机构
[1] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Beijing, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[3] Baidu X Lab, Sunnyvale, CA USA
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Return-Oriented Programming (ROP) is a sophisticated exploitation technique that is able to drive target applications to perform arbitrary unintended operations by constructing a gadget chain reusing existing small code sequences (gadgets) collected across the entire code space. In this paper, we propose to address ROP attacks from a different angle-shrinking available code space at runtime. We present ROPStarvation, a generic and transparent ROP countermeasure that defend against all types of ROP attacks with almost zero run-time overhead. ROPStarvation does not aim to completely stop ROP attacks, instead it attempts to significantly increase the bar by decreasing the possibility of launching a successful ROP exploit in reality. Moreover, shrinking available code space at runtime is lightweight that makes ROPStarvation practical for being deployed with high performance requirement. Results show that ROPStarvation successfully reduces the code space of target applications by 85%. With the reduced code segments, ROPStarvation decreases the probability of building a valid ROP gadget chain by 100% and 83% respectively, with the assumptions that whether the adversary knows the vulnerable applications are protected by ROPStarvation. Evaluations on the SPEC CPU2006 benchmark show that ROPStarvation introduces nearly zero (0.2% on average) run-time performance overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks
    Cheng, Yueqiang
    Zhou, Zongwei
    Yu, Miao
    Ding, Xuhua
    Deng, Robert H.
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [2] Defending ROP Attacks Using Basic Block Level Randomization
    Zhan, Xun
    Zheng, Tao
    Gao, Shixiang
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 107 - 112
  • [3] A CLASS OF SYSTEMS WITH NEARLY ZERO DISTRIBUTED SIMULATION OVERHEAD
    KUMAR, D
    INFORMATION SCIENCES, 1992, 66 (1-2) : 23 - 41
  • [4] Defending Against Backdoor Attacks by Quarantine Training
    Yu, Chengxu
    Zhang, Yulai
    IEEE ACCESS, 2024, 12 : 10681 - 10689
  • [5] Defending networks against denial of service attacks
    Gelenbe, E
    Gellman, M
    Loukas, G
    UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 233 - 243
  • [6] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [7] Defending against Sybil attacks in sensor networks
    Zhang, QH
    Wang, P
    Reeves, DS
    Ning, P
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 185 - 191
  • [8] Defending against adversarial attacks by randomized diversification
    Taran, Olga
    Rezaeifar, Shideh
    Holotyak, Taras
    Voloshynovskiy, Slava
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 11218 - 11225
  • [9] Defending against denial of service attacks in scout
    Spatscheck, O
    Peterson, LL
    USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), 1999, : 59 - 72
  • [10] Defending against terrorist attacks with limited resources
    Powell, Robert
    AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (03) : 527 - 541