DocumentCode :
2125291
Title :
JOP-alarm: Detecting jump-oriented programming-based anomalies in applications
Author :
Fan Yao ; Jie Chen ; Venkataramani, Guru
Author_Institution :
Dept. of Electr. & Comput. Eng., George Washington Univ., Washington, DC, USA
fYear :
2013
fDate :
6-9 Oct. 2013
Firstpage :
467
Lastpage :
470
Abstract :
Code Reuse-based Attacks (popularly known as CRA) are becoming increasingly notorious because of their ability to reuse existing code, and evade the guarding mechanisms in place to prevent code injection-based attacks. Among the recent code reuse-based exploits, Jump Oriented Programming (JOP) captures short sequences of existing code ending in indirect jumps or calls (known as gadgets), and utilizes them to cause harmful, unintended program behavior. In this work, we propose a novel, easily implementable algorithm, called JOP-alarm, that computes a score value to assess the potential for JOP attack, and detects possibly harmful program behavior. We demonstrate the effectiveness of our algorithm using published JOP code, and test the false positive alarm rate using several unmodified SPEC2006 benchmarks.
Keywords :
security of data; CRA; JOP attack potential assessment; JOP code; JOP-alarm; SPEC2006 benchmark; code injection-based attack; code reuse-based attacks; code reuse-based exploit; existing code reuse; false positive alarm rate; gadgets; guarding mechanism evasion; harmful unintended program behavior; indirect calls; indirect jumps; jump-oriented programming-based anomaly detection; possibly harmful program behavior detection; score value computation; short existing code sequence; Benchmark testing; Computers; Delays; Programming profession; Security; Standards; Code reuse attack; Detection algorithm; Jump-oriented programming;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Design (ICCD), 2013 IEEE 31st International Conference on
Conference_Location :
Asheville, NC
Type :
conf
DOI :
10.1109/ICCD.2013.6657084
Filename :
6657084
Link To Document :
بازگشت