Towards a Formal Foundation of Protection against Data-Oriented Attacks

被引:0
|
作者
Fukuyama, Ryo [1 ]
Yanai, Naoto [1 ]
Okamura, Shingo [2 ]
Fujiwara, Toru [1 ]
机构
[1] Osaka Univ, 1-5 Yamadaoka, Suita, Osaka 5650871, Japan
[2] Nara Natl Coll Technol, 22 Yata Cho, Yamato Koriyama, Nara 6391080, Japan
来源
PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016) | 2016年
基金
日本学术振兴会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A data-oriented attack allows an adversary to rewrite data values stored in memories by manipulating data flow of a program, and brings serious damage such as leakage of secret keys or escalation of privileges. To the best of our knowledge, there is no practical method for resisting the data oriented attack, and thus we discuss a protection method against the attack. Based on consideration of fundamental features of the data-oriented attack, we especially focus on detection of the attack. More precisely, the data-oriented attack can be detected by dynamically analyzing data flow since the flow is manipulated via the attack. Under this observation, we formally define data oriented attack detection system. That is, the detection of the attack is reduced to some decision problem whereby automata accept the data flow or not. We also discuss the feasibility of the proposed system.
引用
收藏
页码:413 / 417
页数:5
相关论文
共 50 条
  • [1] KPDP: Kernel Permission Data Protection against Data-oriented Attacks
    Xu, Shouyin
    Lei, Lingguang
    Wang, Yuewu
    Huang, Heqing
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 538 - 543
  • [2] Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks
    Ahmed, Salman
    Liljestrand, Hans
    Jamjoom, Hani
    Hicks, Matthew
    Asokan, N.
    Yao, Danfeng
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1433 - 1450
  • [3] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    Nyman, Thomas
    Dessouky, Ghada
    Zeitouni, Shaza
    Lehikoinen, Aaro
    Paverd, Andrew
    Asokan, N.
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [4] Exploitation Techniques and Defenses for Data-Oriented Attacks
    Cheng, Long
    Liljestrand, Hans
    Ahmed, Md Salman
    Nyman, Thomas
    Jaeger, Trent
    Asokan, N.
    Yao, Danfeng
    2019 IEEE SECURE DEVELOPMENT (SECDEV 2019), 2019, : 114 - 128
  • [5] Towards Data-Oriented Schedule Management in Hospital
    Tsumoto, Shusaku
    Hirano, Shoji
    Iwata, Haruko
    2014 ANNUAL SRII GLOBAL CONFERENCE (SRII), 2014, : 181 - 190
  • [6] Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
    Hu, Hong
    Shinde, Shweta
    Adrian, Sendroiu
    Chua, Zheng Leong
    Saxena, Prateek
    Liang, Zhenkai
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 969 - 986
  • [7] Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks
    Cheng, Long
    Tian, Ke
    Yao, Danfeng
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 315 - 326
  • [8] A new intrusion detection method based on data-oriented classification of attacks
    Zou, Tao
    Chen, Hua
    Zhang, Cui
    Huang, Minhuan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES, 2007, : 197 - +
  • [9] Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches
    Cheng, Long
    Ahmed, Salman
    Liljestrand, Hans
    Nyman, Thomas
    Cai, Haipeng
    Jaeger, Trent
    Asokan, N.
    Yao, Danfeng
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (04)
  • [10] Data-oriented parsing
    Klein, D
    COMPUTATIONAL LINGUISTICS, 2004, 30 (02) : 240 - 244