Title :
Practical Control Flow Integrity and Randomization for Binary Executables
Author :
Chao Zhang ; Tao Wei ; Zhaofeng Chen ; Lei Duan ; Szekeres, L. ; McCamant, S. ; Song, Dong ; Wei Zou
Author_Institution :
Beijing Key Lab. of Internet Security Technol., Peking Univ., Beijing, China
Abstract :
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and compatibility issues limit its adoption. We propose a new practical and realistic protection method called CCFIR (Compact Control Flow Integrity and Randomization), which addresses the main barriers to CFI adoption. CCFIR collects all legal targets of indirect control-transfer instructions, puts them into a dedicated "Springboard section" in a random order, and then limits indirect transfers to flow only to them. Using the Springboard section for targets, CCFIR can validate a target more simply and faster than traditional CFI, and provide support for on-site target-randomization as well as better compatibility. Based on these approaches, CCFIR can stop control-flow hijacking attacks including ROP and return-into-libc. Results show that ROP gadgets are all eliminated. We observe that with the wide deployment of ASLR, Windows/x86 PE executables contain enough information in relocation tables which CCFIR can use to find all legal instructions and jump targets reliably, without source code or symbol information. We evaluate our prototype implementation on common web browsers and the SPEC CPU2000 suite: CCFIR protects large applications such as GCC and Firefox completely automatically, and has low performance overhead of about 3.6%/8.6% (average/max) using SPECint2000. Experiments on real-world exploits also show that CCFIR-hardened versions of IE6, Firefox 3.6 and other applications are protected effectively.
Keywords :
Web sites; computer crime; legislation; online front-ends; ASLR; CCFIR; CFI adoption; Firefox; GCC; ROP; SPEC CPU2000; Web browser; Windows/x86 PE; binary executable; compact control flow integrity and randomization; control-flow hijacking attack protection; control-transfer instruction; legal instruction; on-site target-randomization; protection method; return-into-libc; springboard section; Control systems; Law; Layout; Libraries; Runtime; Security;
Conference_Titel :
Security and Privacy (SP), 2013 IEEE Symposium on
Conference_Location :
Berkeley, CA
Print_ISBN :
978-1-4673-6166-8
Electronic_ISBN :
1081-6011