Mitigating Over-Permissible Transfer for Control Flow Integrity

Chung Kuan Chen, Shang Kuei Chen, Shiuh-Pyng Shieh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Control flow integrity (CFI) is a promising defense mechanism for controlling hijacking attacks. In most situations, CFI prevents the control flow transfer from hijacking by the adversary. However, the over-permissible transfer problem remains a major issue in most CFI systems. By taking advantage of this problem, an adversary can still hijack control flows to the code not designed by the original programmer but intended for execution by the adversary. To eliminate over-permissible transfer, we propose transfer target analysis for the CFI system. With value set analysis and concolic execution, the transfer target analysis is able to construct the precise control flow graph. Given the fine-grained policy, over-permissible transfer can be prohibited. To save memory, the Bloom filter-based policy database is established to store a large number of policies in a compact data structure with low false positive rate. The evaluation uses benign programs from the SPEC CPU2006 benchmarks and the malign programs from the RIPE benchmark. The result shows that all the benign programs can execute normally but all the malign programs are blocked.

Original languageEnglish
Title of host publicationDSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538657904
DOIs
StatePublished - 23 Jan 2019
Event2018 IEEE Conference on Dependable and Secure Computing, DSC 2018 - Kaohsiung, Taiwan
Duration: 10 Dec 201813 Dec 2018

Publication series

NameDSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing

Conference

Conference2018 IEEE Conference on Dependable and Secure Computing, DSC 2018
Country/TerritoryTaiwan
CityKaohsiung
Period10/12/1813/12/18

Keywords

  • control flow integrity
  • control-flow hijack
  • symbolic execution
  • vulnerability

Fingerprint

Dive into the research topics of 'Mitigating Over-Permissible Transfer for Control Flow Integrity'. Together they form a unique fingerprint.

Cite this