Leakage-Resilient Layout Randomization for Mobile Devices

被引:11
|
作者
Braden, Kjell [1 ,2 ]
Crane, Stephen [3 ]
Davi, Lucas [1 ]
Franz, Michael [4 ]
Larsen, Per [3 ,4 ]
Liebchen, Christopher [1 ]
Sadeghi, Ahmad-Reza [1 ]
机构
[1] Tech Univ Darmstadt, CASED, Darmstadt, Germany
[2] EURECOM, Biot, France
[3] Immunant Inc, Irvine, CA USA
[4] Univ Calif Irvine, Irvine, CA USA
关键词
D O I
10.14722/ndss.2016.23364
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack techniques based on code reuse continue to enable real-world exploits bypassing all current mitigations. Code randomization defenses greatly improve resilience against code reuse. Unfortunately, sophisticated modern attacks such as JIT-ROP can circumvent randomization by discovering the actual code layout on the target and relocating the attack payload on the fly. Hence, effective code randomization additionally requires that the code layout cannot be leaked to adversaries. Previous approaches to leakage-resilient diversity have either relied on hardware features that are not available in all processors, particularly resource-limited processors commonly found in mobile devices, or they have had high memory overheads. We introduce a code randomization technique that avoids these limitations and scales down to mobile and embedded devices: Leakage-Resilient Layout Randomization (LR2). Whereas previous solutions have relied on virtualization, x86 segmentation, or virtual memory support, LR2 merely requires the underlying processor to enforce a W circle plus X policy-a feature that is virtually ubiquitous in modern processors, including mobile and embedded variants. Our evaluation shows that LR2 provides the same security as existing virtualization-based solutions while avoiding design decisions that would prevent deployment on less capable yet equally vulnerable systems. Although we enforce execute-only permissions in software, LR2 is as efficient as the best-in-class virtualization-based solution.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [2] Leakage-Resilient Cryptography
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 293 - +
  • [3] Leakage-Resilient Storage
    Davi, Francesco
    Dziembowski, Stefan
    Venturi, Daniele
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 121 - +
  • [4] Leakage-Resilient Signatures
    Faust, Sebastian
    Kiltz, Eike
    Pietrzak, Krzysztof
    Rothblum, Guy N.
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 343 - +
  • [5] Secure Mobile Agent from Leakage-Resilient Proxy Signatures
    Tang, Fei
    Li, Hongda
    Niu, Qihua
    Liang, Bei
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [6] Leakage-Resilient Zero Knowledge
    Garg, Sanjam
    Jain, Abhishek
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 297 - 315
  • [7] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    JOURNAL OF CRYPTOLOGY, 2013, 26 (03) : 513 - 558
  • [8] Leakage-resilient coin tossing
    Elette Boyle
    Shafi Goldwasser
    Yael Tauman Kalai
    Distributed Computing, 2014, 27 : 147 - 164
  • [9] Leakage-Resilient Coin Tossing
    Boyle, Elette
    Goldwasser, Shafi
    Kalai, Yael Tauman
    DISTRIBUTED COMPUTING, 2011, 6950 : 181 - +
  • [10] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 89 - +