Finding Runtime Usable Gadgets: On the Security of Return Address Authentication

被引:0
|
作者
Xu, Qizhen [1 ,2 ]
Zhang, Zhijie [1 ,2 ]
Zhang, Lin [3 ]
Chen, Liwei [1 ,2 ]
Shi, Gang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Minist Agr & Rural Affairs, Ctr Engn & Construct Serv, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Return address authentication; reuse attack; memory security;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00059
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Return address authentication mechanisms protect return addresses by calculating and checking their message authentication codes (MACs) at runtime. However, these works only provide empirical analysis on their security, and it is still unclear whether the attacker can bypass these defenses by launching reuse attacks. In this paper, we present a solution to quantitatively analysis the security of return address authentication mechanisms against reuse attacks. Our solution utilizes some libc functions that could leakage data from memory. First, we perform reaching definition analysis to identify the source of parameters of these functions. Then we infer how many MACs could be observed at runtime by modifying these parameters. Afterward, we select the gadgets that could be exploited by reusing these observed MACs. Finally, we stitch desired gadget to craft attacks. We evaluated our solution on 5 real-word applications and successfully crafted reuse attacks on 3 of them. We find that the larger an application is, the more libc functions and gadgets can be found and reused, and furthermore, the more likely the attack is successfully crafted.
引用
收藏
页码:374 / 381
页数:8
相关论文
共 16 条
  • [1] A Set of Heuristics for Usable Security and User Authentication
    Realpe, Paulo C.
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Antoni
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [2] Passphrase and keystroke dynamics authentication: Usable security
    Bhana, Bhaveer
    Flowerday, Stephen
    COMPUTERS & SECURITY, 2020, 96
  • [3] An enhancement of return address stack for security
    Chen, Chien-Ming
    Chen, Shaui-Min
    Ting, Wei-Chih
    Kao, Chi-Yi
    Sun, Hung-Min
    COMPUTER STANDARDS & INTERFACES, 2015, 38 : 17 - 24
  • [4] Usable Security of Authentication Process: New Approach and Practical Assessment
    Althobaiti, Maha M.
    Mayhew, Pam
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 179 - 180
  • [5] Exploring User-Centered Security Design for Usable Authentication Ceremonies
    Fassl, Matthias
    Grober, Lea Theresa
    Krombholz, Katharina
    CHI '21: PROCEEDINGS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2021,
  • [6] User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
    Jeong, Jongkil Jay
    Shah, Syed Wajid Ali
    Nanda, Ashish
    Doss, Robin
    Nosouhi, Mohammad
    Webb, Jeb
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2024, 54 (05) : 554 - 564
  • [7] Examining usable security features and user perceptions of Physical Authentication Devices
    Nanda, Ashish
    Jeong, Jongkil Jay
    Shah, Syed Wajid Ali
    Nosouhi, Mohammad
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 139
  • [8] Usable security: User preferences for authentication methods in eBanking and the effects of experience
    Weir, Catherine S.
    Douglas, Gary
    Richardson, Tim
    Jack, Mervyn
    INTERACTING WITH COMPUTERS, 2010, 22 (03) : 153 - 164
  • [9] Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices
    Kai Lehniger
    Abdelaziz Saad
    Peter Langendörfer
    Annals of Telecommunications, 2023, 78 : 209 - 220
  • [10] Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices
    Lehniger, Kai
    Saad, Abdelaziz
    Langendoerfer, Peter
    ANNALS OF TELECOMMUNICATIONS, 2023, 78 (3-4) : 209 - 220