Opaque Control-Flow Integrity

@inproceedings{Mohan2015OpaqueCI,
  title={Opaque Control-Flow Integrity},
  author={Vishwath Mohan and Peter Larsen and Stefan Brunthaler and Kevin W. Hamlen and Michael Franz},
  booktitle={NDSS},
  year={2015}
}
A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed adversaries who possess full knowledge of the inmemory code layout of victim programs. The defense mitigates a recent wave of implementation disclosure attacks, by which adversaries can exfiltrate in-memory code details in order to prepare code-reuse attacks (e.g., Return-Oriented Programming (ROP) attacks) that… CONTINUE READING

Figures, Tables, Results, and Topics from this paper.

Key Quantitative Results

  • Experiments using our fully functional prototype implementation show that O-CFI provides significant probabilistic protection against ROP attacks launched by adversaries with complete code layout knowledge, and exhibits only 4.7% mean performance overhead on current hardware (with further overhead reductions to follow on forthcoming Intel processors).

Citations

Publications citing this paper.
SHOWING 1-10 OF 98 CITATIONS

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization

Zhe Wang, Chenggang Wu, +7 authors Zhiping Shi
  • USENIX Security Symposium
  • 2019
VIEW 6 EXCERPTS
HIGHLY INFLUENCED

Efficient Security Monitoring with the Core Debug Interface in an Embedded Processor

  • ACM Trans. Design Autom. Electr. Syst.
  • 2016
VIEW 22 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Feel Me Flow: A Review of Control-Flow Integrity Methods for User and Kernel Space

  • SOCO-CISIS-ICEUTE
  • 2016
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks

  • ACM Conference on Computer and Communications Security
  • 2015
VIEW 17 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity

  • ACM Conference on Computer and Communications Security
  • 2015
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Detection of Intrusions and Malware, and Vulnerability Assessment

  • Lecture Notes in Computer Science
  • 2015
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Securing software systems by preventing information leaks

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Prescriptive Safety-Checks through Automated Proofs for Control-Flow Integrity

VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2015
2019

CITATION STATISTICS

  • 14 Highly Influenced Citations

  • Averaged 17 Citations per year from 2017 through 2019

  • 14% Increase in citations per year in 2019 over 2018

References

Publications referenced by this paper.
SHOWING 1-10 OF 50 REFERENCES

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

  • 2013 IEEE Symposium on Security and Privacy
  • 2013
VIEW 13 EXCERPTS
HIGHLY INFLUENTIAL

Evaluating SFI for a CISC Architecture

  • USENIX Security Symposium
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Hacking Blind

  • 2014 IEEE Symposium on Security and Privacy
  • 2014
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Control Flow Integrity for COTS Binaries

  • USENIX Security Symposium
  • 2013
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Practical Control Flow Integrity and Randomization for Binary Executables

  • 2013 IEEE Symposium on Security and Privacy
  • 2013
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Breaking the memory secrecy assumption

  • EUROSEC
  • 2009
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Bypassing EMET 4.1

  • IEEE Security & Privacy
  • 2015