Leakage-Resilient Layout Randomization for Mobile Devices

被引:11
|
作者
Braden, Kjell [1 ,2 ]
Crane, Stephen [3 ]
Davi, Lucas [1 ]
Franz, Michael [4 ]
Larsen, Per [3 ,4 ]
Liebchen, Christopher [1 ]
Sadeghi, Ahmad-Reza [1 ]
机构
[1] Tech Univ Darmstadt, CASED, Darmstadt, Germany
[2] EURECOM, Biot, France
[3] Immunant Inc, Irvine, CA USA
[4] Univ Calif Irvine, Irvine, CA USA
关键词
D O I
10.14722/ndss.2016.23364
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack techniques based on code reuse continue to enable real-world exploits bypassing all current mitigations. Code randomization defenses greatly improve resilience against code reuse. Unfortunately, sophisticated modern attacks such as JIT-ROP can circumvent randomization by discovering the actual code layout on the target and relocating the attack payload on the fly. Hence, effective code randomization additionally requires that the code layout cannot be leaked to adversaries. Previous approaches to leakage-resilient diversity have either relied on hardware features that are not available in all processors, particularly resource-limited processors commonly found in mobile devices, or they have had high memory overheads. We introduce a code randomization technique that avoids these limitations and scales down to mobile and embedded devices: Leakage-Resilient Layout Randomization (LR2). Whereas previous solutions have relied on virtualization, x86 segmentation, or virtual memory support, LR2 merely requires the underlying processor to enforce a W circle plus X policy-a feature that is virtually ubiquitous in modern processors, including mobile and embedded variants. Our evaluation shows that LR2 provides the same security as existing virtualization-based solutions while avoiding design decisions that would prevent deployment on less capable yet equally vulnerable systems. Although we enforce execute-only permissions in software, LR2 is as efficient as the best-in-class virtualization-based solution.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Practical Leakage-Resilient Pseudorandom Generators
    Yu, Yu
    Standaert, Francois-Xavier
    Pereira, Olivier
    Yung, Moti
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 141 - 151
  • [22] A new construction of leakage-resilient signature
    Wang, Zhiwei
    Zhang, Wei
    Journal of Computational Information Systems, 2010, 6 (02): : 387 - 394
  • [23] Leakage-resilient ring signature schemes
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2019, 759 : 1 - 13
  • [24] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices
    Peng, An-Li
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5343 - 5354
  • [25] Leakage-Resilient Cryptography from Minimal Assumptions
    Carmit Hazay
    Adriana López-Alt
    Hoeteck Wee
    Daniel Wichs
    Journal of Cryptology, 2016, 29 : 514 - 551
  • [26] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [27] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [28] Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
    Bhushan, Kaartik
    Goyal, Rishab
    Koppula, Venkata
    Narayanan, Varun
    Prabhakaran, Manoj
    Rajasree, Mahesh Sreekumar
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VII, 2025, 15490 : 201 - 234
  • [29] Leakage-Resilient Circuits without Computational Assumptions
    Dziembowski, Stefan
    Faust, Sebastian
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 230 - 247
  • [30] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528