期刊文献+

ARM架构中控制流完整性验证技术研究 被引量:1

Research on Control Flow Integrity Verification Technology in ARM Architecture
下载PDF
导出
摘要 通用平台目标二进制代码运行时控制流的提取主要依赖于处理器硬件特性,或其动态二进制插桩工具,该平台的控制流完整性验证方法无法直接移植到进阶精简指令集机器(ARM)架构中。为此,基于控制流完整性验证技术,设计一种用于ARM架构,利用缓冲溢出漏洞检测控制流劫持攻击的方法。该方法在程序加载时、执行前动态构建合法跳转地址白名单,在目标二进制代码动态执行过程中完成控制流完整性验证,从而检测非法控制流转移,并对非法跳转地址进行分析,实现漏洞的检测和诊断。在ARM-Linux系统的动态二进制分析平台上实施测试,结果表明,该方法能够检测出漏洞,并精确定位攻击矢量。 On common platform,the extraction of run-time control-flow to target binary code relies on either processor's mechanism or Dynamic Binary Instrumentation(DBI)tools. So,the implementation on common platform can not be transplanted to Advanced RISC Machine(ARM)directly. Based on Control Flow Integrity(CFI)enforcement,this paper designs a method to detect and diagnose control flow hijacking which is implemented by exploit a buffer overflow vulnerability on ARM. This method dynamically builds a white-list of legitimate branch target address before the target binary code execute,performs CFI enforcement to detect illegal control-flow transfer at run-time,analyzes the illegal branch target address to achieve exploit diagnosis. It implements the technique on a dynamic binary analysis platform for ARM-Linux systems. Results show that it can effectively detect the exploit and locates the attack vector.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第3期151-155,171,共6页 Computer Engineering
关键词 控制流完整性 进阶精简指令集机器架构 合法地址白名单 动态二进制分析 攻击矢量定位 Control Flow Integrity(CFI) Advanced RISC Machine(ARM)architecture legitimate address white-list dynamic binary analysis attack vector location
  • 相关文献

同被引文献19

  • 1Bejtlich R. Understanding the advanced persistent threat[EB/OL]. [ 2015-06-15]. http://searchsecurity, techtarget. com. html.
  • 2Krebs B. Crimepack: Packed with hard lessons [EB/OL]. [2015-06-15]. http://krebsonsecurity, com/2010/081crimepack- packedwit h-hard-lessons.
  • 3Bitg+Carbon Black. The bit9 security platformv7 [EB/OL]. [2015-06-15]. https://www, bitg. eomldownload]data-sheets] Bit9-Securit y-Plat formvT, pdf.
  • 4Shaffer R. Raising the white flag: Bypassing application whitelisting [EB/OL]. [2015-06-15]. http://foregroundsecurity. com/rcsources/blog.
  • 5Cristoph H. Bypassing PatchGuard 3 [EB/OL]. [2015-06- 15]. http://www, codeproiect, comlArticles128318/Bypassing- PatchGuard.
  • 6Saile R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture [C] //Proe of the 13th USENIX Security Syrup. Berkeley, CA: USENIX Association, 2004.
  • 7ARM. Building a secure system using TrustZone [EB/OL]. [2015-06-15]. http://www, arm. com.
  • 8Petroni N L, Fraser T, Molina J, et al. Copilota coprocessor-based kernel runtime integrity monitor [C] // Proc of the 13th USENIX Security Syrup. Berkeley, CA: USENIX Association, 2004.
  • 9Seshadri A, Luk M, Perrig A. Secvisor: A tiny hypervisor to provide etime kernel code integrity for commodity oses [J]. ACM SIGOPS Operating Systems Review, 2007, 41 (6): 335-350.
  • 10Ge X, Vijayakumar H, Jaeger T. SPROBES: Enforcing kernel code integrity on the trustzone architecture [C] //Proc of the Mobile Security Technologies (MOST) Workshop. Piseataway, NJ: IEEE, 2014.

引证文献1

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部