TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity

被引:1
|
作者
Geden, Munir [1 ]
Rasmussen, Kasper [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
runtime integrity; data attacks; trust;
D O I
10.1109/TrustCom50675.2020.00035
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data-oriented attacks, where the adversary corrupts critical program data in memory, remain one of the most challenging security threats to address. Because the attacker does not touch any code or code pointers, data-oriented attacks are able to circumvent common defence strategies such as data execution prevention or control-flow protection. Dataflow integrity (DFI) techniques can mitigate these attacks by detecting corruption of any program data. However, due to high performance costs, these techniques are not widely adopted in practice. This paper presents TRUVIN, a lightweight scheme that addresses data-oriented attacks by focusing on only those variables which are crucial to the integrity assurance. Instead of checking every memory operation, TRUVIN selectively instruments program data originating from only trusted agents (e.g., the programmer), as they are considered critical to the runtime integrity. Our scheme analyses the program at compile time, and generates instrumentation only for the necessary operations. TRUVIN reduces the performance cost by a factor of 4.3 on average with 28% overhead compared to full instrumentation (121%), while retaining the security guarantees.
引用
收藏
页码:174 / 181
页数:8
相关论文
共 48 条
  • [1] SECDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity
    Shen, Dakun
    Hou, Tao
    Lu, Zhuo
    Liu, Yao
    Wang, Tao
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [2] A new intrusion detection method based on data-oriented classification of attacks
    Zou, Tao
    Chen, Hua
    Zhang, Cui
    Huang, Minhuan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES, 2007, : 197 - +
  • [3] Exploitation Techniques and Defenses for Data-Oriented Attacks
    Cheng, Long
    Liljestrand, Hans
    Ahmed, Md Salman
    Nyman, Thomas
    Jaeger, Trent
    Asokan, N.
    Yao, Danfeng
    2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 114 - 128
  • [4] Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
    Hu, Hong
    Shinde, Shweta
    Adrian, Sendroiu
    Chua, Zheng Leong
    Saxena, Prateek
    Liang, Zhenkai
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 969 - 986
  • [5] KPDP: Kernel Permission Data Protection against Data-oriented Attacks
    Xu, Shouyin
    Lei, Lingguang
    Wang, Yuewu
    Huang, Heqing
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 538 - 543
  • [6] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    Nyman, Thomas
    Dessouky, Ghada
    Zeitouni, Shaza
    Lehikoinen, Aaro
    Paverd, Andrew
    Asokan, N.
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [7] Towards a Formal Foundation of Protection against Data-Oriented Attacks
    Fukuyama, Ryo
    Yanai, Naoto
    Okamura, Shingo
    Fujiwara, Toru
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 413 - 417
  • [8] Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches
    Cheng, Long
    Ahmed, Salman
    Liljestrand, Hans
    Nyman, Thomas
    Cai, Haipeng
    Jaeger, Trent
    Asokan, N.
    Yao, Danfeng
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (04)
  • [9] Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks
    Ahmed, Salman
    Liljestrand, Hans
    Jamjoom, Hani
    Hicks, Matthew
    Asokan, N.
    Yao, Danfeng
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1433 - 1450
  • [10] RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks
    Geden, Munir
    Rasmussen, Kasper
    COMPUTERS & SECURITY, 2023, 129