Abstract
Address space randomization has long been used for counteracting code reuse attacks, ranging from conventional ROP to sophisticated Just-in-Time ROP. At the high level, it shuffles program code in memory and thus prevents malicious ROP payload from performing arbitrary operations. While effective in mitigating attacks, existing randomization mechanisms are impractical for real-world applications and systems, especially considering the significant performance overhead and potential program corruption incurred by their implementation. In this paper, we introduce CHAMELEON, a practical defense mechanism that hinders code reuse attacks, particularly Just-in-Time ROP attacks. Technically speaking, CHAMELEON instruments program code, randomly shuffles code page addresses and minimizes the attack surface exposed to adversaries. While this defense mechanism follows in the footprints of address space randomization, our design principle focuses on using randomization to obstruct code page disclosure, making the ensuing attacks infeasible. We implemented a prototype of CHAMELEON on Linux operating system and extensively experimented it in different settings. Our theoretical and empirical evaluation indicates the effectiveness and efficiency of CHAMELEON in thwarting Just-in-Time ROP attacks.
Original language | English (US) |
---|---|
Title of host publication | Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 451-462 |
Number of pages | 12 |
ISBN (Electronic) | 9781538605417 |
DOIs | |
State | Published - Aug 30 2017 |
Event | 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 - Denver, United States Duration: Jun 26 2017 → Jun 29 2017 |
Publication series
Name | Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 |
---|
Conference
Conference | 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 |
---|---|
Country/Territory | United States |
City | Denver |
Period | 6/26/17 → 6/29/17 |
Funding
IX. ACKNOWLEDGEMENT We would like to thank Jun Wang and Yu Hou for their valuabletechnical supports, and professor Zhiqiang Lin for his valuablecomments on this paper. This work was supported by ARO W911NF-13-1-0421 (MURI), NSF CNS-1422594, NSF CNS-1505664, and Chinese National Natural Science Foundation (NSFC 61073027, NSFC 61272078, NSFC 61321491).
Keywords
- Address space randomization
- JIT-ROP
- OS kernel
- binary instrumentation
ASJC Scopus subject areas
- Hardware and Architecture
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality