Exploitation Techniques and Defenses for Data-Oriented Attacks

被引:10
|
作者
Cheng, Long [1 ]
Liljestrand, Hans [2 ]
Ahmed, Md Salman [3 ]
Nyman, Thomas [2 ]
Jaeger, Trent [4 ]
Asokan, N. [2 ]
Yao, Danfeng [3 ]
机构
[1] Clemson Univ, Sch Comp, Clemson, SC 29631 USA
[2] Aalto Univ, Dept Comp Sci, Espoo, Finland
[3] Virginia Tech, Dept Comp Sci, Blacksburg, VA USA
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
来源
2019 IEEE SECURE DEVELOPMENT (SECDEV 2019) | 2019年
基金
芬兰科学院; 美国国家科学基金会;
关键词
Data-oriented attacks; Exploitation techniques; Defenses; Systematization of knowledge (SoK); RANDOMIZATION;
D O I
10.1109/SecDev.2019.00022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data-oriented attacks manipulate non-control data to alter a program's benign behavior without violating its controlflow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechanisms. However, these threats have not been adequately addressed. In this systematization of knowledge (SoK) paper, we first map data-oriented exploits, including Data-Oriented Programming (DOP) and Block-Oriented Programming attacks, to their assumptions/requirements and attack capabilities. We also compare known defenses against these attacks, in terms of approach, detection capabilities, overhead, and compatibility. Then we discuss the possible frequency anomalies of data-oriented attacks, especially the frequency anomalies of DOP attacks with experimental proofs. It is generally believed that control flows may not be useful for data-oriented security. However, the frequency anomalies show that data-oriented attacks (especially DOP attacks) may generate side-effects on control-flow behavior in multiple dimensions. In the end, we discuss challenges for building deployable data-oriented defenses and open research questions.
引用
收藏
页码:114 / 128
页数:15
相关论文
共 50 条
  • [1] Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches
    Cheng, Long
    Ahmed, Salman
    Liljestrand, Hans
    Nyman, Thomas
    Cai, Haipeng
    Jaeger, Trent
    Asokan, N.
    Yao, Danfeng
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (04)
  • [2] A Survey of Exploitation Techniques and Defenses for Program Data Attacks
    Wang, Ye
    Li, Qingbao
    Chen, Zhifeng
    Zhang, Ping
    Zhang, Guimin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 154
  • [3] Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
    Hu, Hong
    Shinde, Shweta
    Adrian, Sendroiu
    Chua, Zheng Leong
    Saxena, Prateek
    Liang, Zhenkai
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 969 - 986
  • [4] KPDP: Kernel Permission Data Protection against Data-oriented Attacks
    Xu, Shouyin
    Lei, Lingguang
    Wang, Yuewu
    Huang, Heqing
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 538 - 543
  • [5] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    Nyman, Thomas
    Dessouky, Ghada
    Zeitouni, Shaza
    Lehikoinen, Aaro
    Paverd, Andrew
    Asokan, N.
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [6] Towards a Formal Foundation of Protection against Data-Oriented Attacks
    Fukuyama, Ryo
    Yanai, Naoto
    Okamura, Shingo
    Fujiwara, Toru
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 413 - 417
  • [7] A new intrusion detection method based on data-oriented classification of attacks
    Zou, Tao
    Chen, Hua
    Zhang, Cui
    Huang, Minhuan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES, 2007, : 197 - +
  • [8] Data-oriented parsing
    Klein, D
    COMPUTATIONAL LINGUISTICS, 2004, 30 (02) : 240 - 244
  • [9] SECDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity
    Shen, Dakun
    Hou, Tao
    Lu, Zhuo
    Liu, Yao
    Wang, Tao
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [10] TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity
    Geden, Munir
    Rasmussen, Kasper
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 174 - 181