HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks

被引:0
|
作者
Xin Huang
Fei Yan
Liqiang Zhang
Kai Wang
机构
[1] Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering
来源
Information Systems Frontiers | 2021年 / 23卷
关键词
Gadgets insertion; Deception; Control flow; Last Branch Record;
D O I
暂无
中图分类号
学科分类号
摘要
Code reuse attacks such as Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP) are the prevalent attack techniques which reuse code snippets named gadget in vulnerable applications and hijack control flow to achieve malicious behaviors. Existing defense techniques for code reuse attacks attempt to prevent illegal control flow transition or make locating gadgets a hard work. However, decades of the arms race proved the ability to detect and prevent advanced attacks is still outdated. In this paper, we propose HoneyGadget, a deception based approach for detecting code reuse attacks. HoneyGadget works by inserting honey gadgets into the application as decoys and keep track of their addresses once the application is loaded. During the execution phase, HoneyGadget traces the execution records using Last Branch Record (LBR), compares the LBR records with the maintained address list, and alarms code reuse attacks if some records match. HoneyGadget not only prevents code reuse attacks, but also provides LBR records for researchers to analyze patterns of these attacks. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can capture code reuse attacks effectively and only incurs a modest performance overhead.
引用
收藏
页码:269 / 283
页数:14
相关论文
共 50 条
  • [21] Capturing Malware Propagations with Code Injections and Code-Reuse Attacks
    Korczynski, David
    Yin, Heng
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1691 - 1708
  • [22] SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks
    Kayaalp, Mehmet
    Schmitt, Timothy
    Nomani, Junaid
    Ponomarev, Dmitry
    Abu-Ghazaleh, Nael
    19TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA2013), 2013, : 258 - 269
  • [23] Bee Master: Detecting Host-Based Code Injection Attacks
    Barabosch, Thomas
    Eschweiler, Sebastian
    Gerhards-Padilla, Elmar
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 235 - 254
  • [24] Efficiently Securing Systems from Code Reuse Attacks
    Kayaalp, Mehmet
    Ozsoy, Meltem
    Abu Ghazaleh, Nael
    Ponomarev, Dmitry
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (05) : 1144 - 1156
  • [25] ROPocop - Dynamic mitigation of code-reuse attacks
    Follner, Andreas
    Bodden, Eric
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 16 - 26
  • [26] US Airways' Wolf attacks 'deception' of code-sharing
    Shifrin, CA
    AVIATION WEEK & SPACE TECHNOLOGY, 1998, 148 (21): : 56 - 57
  • [27] Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
    Ceker, Hayreddin
    Zhuang, Jun
    Upadhyaya, Shambhu
    La, Quang Duy
    Soong, Boon-Hee
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 18 - 38
  • [28] Detecting probability footprints of sensor deception attacks in supervisory control
    Fahim, Parastou
    Meira-Goes, Romulo
    IFAC PAPERSONLINE, 2024, 58 (01): : 192 - 197
  • [29] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors
    Oh, Hyunyoung
    Cho, Yeongpil
    Paek, Yunheung
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 7287 - 7314
  • [30] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors
    Hyunyoung Oh
    Yeongpil Cho
    Yunheung Paek
    The Journal of Supercomputing, 2021, 77 : 7287 - 7314