全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

HBROP:基于硬件性能计数器的函数级ROP检测 HBROP:HPC-Based Function-Level Approach to Detect ROP Attack

Keywords: ROP,分支预测不命中,缓存命中率,硬件性能计数器

Full-Text   Cite this paper   Add to My Lib

Abstract:

ROP(return oriented programming)能够绕过数据执行保护,并结合内存泄漏和暴力破解突破ASLR等现有系统防御机制,具有极大危害,为此本文基于ROP shellcode不满足时间和空间局部性原理,会影响分支预测不命中、缓存命中率等性能事件值的现象,提出了一种利用硬件性能计数器(hardware performance counters,HPCs)进行的ROP检测方法 HBROP,该方法分为离线预处理和动态监控两个阶段.在离线预处理阶段收集并存储所有函数正常的性能事件值,在动态监控阶段监测程序执行,在调用敏感系统函数前检测同一函数相同性能事件值是否异常变化.基于该方法,本文实现了一个HBROP的实验系统,实验表明,本文所选取的8个性能事件具有较好的ROP检测特征;本文的方法,与同类工作相比较,性能开销在可接受范围内

References

[1]  Google Security Research.Wireshark-file_read(wtap_read_bytes_or_eof/mp2t_find_next_pcr)Stack-Based Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/38997/.
[2]  FOLLNER A,BODDEN E.ROPocop—Dynamic mitigation of code-reuse attacks[J].Journal of Information Security&Applications,2015(29):16-26.
[3]  PAPPAS V,POLYCHRONAKIS M,KEROMYTIS A D.Transparent ROP Exploit Mitigation Using Indirect Branch Tracing[C]//22nd USENIX Security Symposium.Berkeley:USENIX,2013:447-462.
[4]  ZHOU H W,WU X,SHI W C,et al.HDROP:Detecting ROP attacks using performance monitoring counters[C]//International Conference on Information Security Practice and Experience.Berlin:Springer,2014:172-186.
[5]  Alberto Ortega.No-IP Dynamic Update Client(DUC)2.1.9-Local IP Address Stack Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/25411.
[6]  Google Security Research.Glibc-getaddrinfo StackBased Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/39454.
[7]  Google Security Research.pdfium CPDF_Function::CallStack-Based Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/39165/.
[8]  CHENG Y,ZHOU Z,MIAO Y,et al.ROPecker:A generic and practical approach for defending against ROP attack[J].Proceedings of the 21th Annual Network and Distributed System Security Symposium,2014(2):1-14.
[9]  CARLINI N,WAGNER D.ROP is still dangerous:Breaking modern defenses[C]//23rd USENIX Security Symposium(USENIX Security 14).Berkeley:USENIX,2014:385-399.
[10]  GKTAS E,ATHANASOPOULOS E,POLYCHRONAKIS M,et al.Size does matter:Why using gadget-chain length to prevent code-reuse attacks is hard[C]//23rd USENIX Security Symposium(USENIX Security 14).Berkeley:USENIX,2014:417-432.
[11]  ICL of University of Tennessee.PAPI Programmer’s Reference[DB/OL].[2016-01-04].http://icl.cs.utk.edu/papi.
[12]  PFAFF D,HACK S,HAMMER C.Learning how to prevent return-oriented programming efficiently[C]//International Symposium on Engineering Secure Software and Systems.Berlin:Springer,2015:68-85.
[13]  SHACHAM H.The geometry of innocent flesh on the bone:Return-into-libc without function calls(on the x86)[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:552-561.
[14]  Google Security Research.glibc-getaddrinfo StackBased Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/39454/.
[15]  Standard Performance Evaluation Corporation.Standard Performance Evaluation Corporation[DB/OL].[2016-03-04].http://www.spec.org.
[16]  The PaX Team.Homepage of The PaX Team[DB/OL].[2016-01-04].https://pax.grsecurity.net/.
[17]  VAN DE VEN A.New security enhancements in red hat enterprise linux v.3,update 3[DB/OL].[2016-01-05].http://www.redhat.com/f/pdf/rhel/WHP0006US_Execshield.pdf.
[18]  BUCHANAN E,ROEMER R,SHACHAM H,et al.When good instructions go bad:Generalizing returnoriented programming to RISC[C]//Proceedings of the 15th ACM conference on Computer and communications security.New York:ACM,2008:27-38.
[19]  CHECKOWAY S,DAVI L,DMITRIENKO A,et al.Return-oriented programming without returns[C]//Proceedings of the 17th ACM conference on Computer and communications security.New York:ACM,2010:559-572.
[20]  The PaX Team.Address space layout randomization[DB/OL].[2016-02-12].https://pax.grsecurity.net/docs/aslr.txt.
[21]  DAVI L,SADEGHI A R,LEHMANN D,et al.Stitching the gadgets:On the ineffectiveness of coarsegrained control-flow integrity protection[C]//23rd USENIX Security Symposium(USENIX Security14).Berkeley:USENIX,2014:401-416.
[22]  刘露平,方勇,刘亮,等.基于动态插桩的缓冲区溢出漏洞检测技术研究[J].信息安全与通信保密,2015(4):80-82.LIU L P,FANG Y,LIU L,et al.Buffer overflow vulnerability detection technology based on dynamic instrumentation[J].Information Security and Communications Privacy,2015(4):80-82(Ch).
[23]  BLETSCH T,JIANG X,FREEH V W,et al.Jumporiented programming:A new class of code-reuse attack[C]//Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security.New York:ACM,2011:30-40.
[24]  尹茗,张功萱.基于源码分析的缓冲区溢出漏洞检测方法[J].江苏大学学报:自然科学版,2016,37(4):450-455.YIN M,ZHANG G X.Buffer overflow detection method based on source code analysis[J].Journal of Jiangsu University:Natural Science Edition,2016,37(4):450-455(Ch).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133