A Security Analysis of Labeling-Based Control-Flow Integrity Schemes

被引:0
|
作者
Demicco, David [1 ]
Cole, Matthew [1 ]
Wang, Shengdun [1 ]
Prakash, Aravind [1 ]
机构
[1] Binghamton Univ, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
tagging architectures; control flow integrity; RISC-V architecture; binary analysis;
D O I
10.1109/HiPCW57629.2022.00011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and transparent policy enforcement by a cloud provider is crucial in cloud infrastructures. Particularly, enforcement of control-flow integrity (CFI) policy has been widely accepted for stopping software-induced attacks. Using low-level hardware metadata to encode CFI policy is a fairly recent development. Besides moving enforcement out of the software and into the hardware for performance benefit, tagging metadata also offers other benefits in the precision of defenses. We evaluate several different metadata layouts for CFI policy enforcement, and examine the layouts' effects on the number of valid forward edges remaining in a RISC-V binary after policy enforcement. Additionally we look at related work in tag-based tools that provide CFI policy enforcement in order to get a sense of their performance and the design trade-offs they make. We evaluate our policy and the related works in terms of space and precision trade-offs for forward- and backward-edge CFI, finding that some trade-offs have a higher impact on the number of remaining forward edges, notably return address protection. Additionally, we report that existing backward edge protections can be highly effective, reducing the number of remaining backward edges in a protected binary to an average of 0.034% over an equivalent coarse-grained CFI.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [41] THE SEMANTICS OF SCHEME CONTROL-FLOW ANALYSIS
    SHIVERS, O
    SIGPLAN NOTICES, 1991, 26 (09): : 190 - 198
  • [42] Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS (vol 2018, 3130652, 2018)
    Qiang, Weizhong
    Wang, Shizhen
    Jin, Hai
    Zhong, Jiangying
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [43] BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph
    Park, Moon Chan
    Lee, Dong Hoon
    IEEE ACCESS, 2023, 11 : 4291 - 4305
  • [44] EBprot: Statistical analysis of labeling-based quantitative proteomics data
    Koh, Hiromi W. L.
    Swa, Hannah L. F.
    Fermin, Damian
    Ler, Siok Ghee
    Gunaratne, Jayantha
    Choi, Hyungwon
    PROTEOMICS, 2015, 15 (15) : 2580 - 2591
  • [45] KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels
    Criswell, John
    Dautenhahn, Nathan
    Adve, Vikram
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 292 - 307
  • [46] Hardware-Assisted Control-Flow Integrity Enhancement for IoT Devices
    Wang, Weiyi
    Feng, Lang
    Shi, Zhiguo
    Zhuo, Cheng
    Chen, Jiming
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [47] HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
    Wang, Zhi
    Jiang, Xuxian
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 380 - 395
  • [48] Integrating Static Analyses for High-Precision Control-Flow Integrity
    Kasten, Florian
    Zieris, Philipp
    Horsch, Julian
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 419 - 434
  • [49] Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
    Tice, Caroline
    Roeder, Tom
    Collingbourne, Peter
    Checkoway, Stephen
    Erlingsson, Ulfar
    Lozano, Luis
    Pike, Geoff
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 941 - 955
  • [50] Poster: Control-Flow Integrity in Low-end Embedded Devices
    Jakkamsetti, Sashidhar
    Kim, Youngil
    Searles, Andrew
    Tsudik, Gene
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3618 - 3620