Skip to main content
Top

2021 | OriginalPaper | Chapter

5. Control-Flow Integrity Enforcement with Dynamic Code Optimization

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Prior to the introduction of CFI in 2005, there have already been a lot of research on dynamic code optimization to improve performance of dynamic program interpreters. For example, Wiggins/Redstone [1], Dynamo [2], Mojo [3], and DynamoRIO [4].

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference D. Deaver, R. Gorton, N. Rubin, Wiggins/Redstone: an on-line program specializer, in Proceedings of the IEEE Hot Chips XI Conference (1999) D. Deaver, R. Gorton, N. Rubin, Wiggins/Redstone: an on-line program specializer, in Proceedings of the IEEE Hot Chips XI Conference (1999)
2.
go back to reference V. Bala, E. Duesterwald, S. Banerjia, Dynamo: a transparent dynamic optimization system, in ACM SIGPLAN Notices, vol. 35 (ACM, 2000) pp. 1–12 V. Bala, E. Duesterwald, S. Banerjia, Dynamo: a transparent dynamic optimization system, in ACM SIGPLAN Notices, vol. 35 (ACM, 2000) pp. 1–12
3.
go back to reference W.-K. Chen, S. Lerner, R. Chaiken, D.M. Gillies, Mojo: a dynamic optimization system, in Proceedings of the 3rd ACM Workshop on Feedback-Directed and Dynamic Optimization, pp. 81–90 (2000) W.-K. Chen, S. Lerner, R. Chaiken, D.M. Gillies, Mojo: a dynamic optimization system, in Proceedings of the 3rd ACM Workshop on Feedback-Directed and Dynamic Optimization, pp. 81–90 (2000)
4.
go back to reference D. Bruening, Efficient,transparent,and comprehensive runtime code manipulation. Ph.D. thesis, Massachusetts Institute of Technology (2004) D. Bruening, Efficient,transparent,and comprehensive runtime code manipulation. Ph.D. thesis, Massachusetts Institute of Technology (2004)
5.
go back to reference V. Kiriansky, D. Bruening, S.P. Amarasinghe, Secure execution via program shepherding, in Proceedings of the 11st USENIX Security Symposium, vol. 92 (2002) V. Kiriansky, D. Bruening, S.P. Amarasinghe, Secure execution via program shepherding, in Proceedings of the 11st USENIX Security Symposium, vol. 92 (2002)
6.
go back to reference M. Zhang, R. Sekar, Control flow integrity for cots binaries, in Proceedings of the 22nd USENIX Security Symposium, pp. 337–352 (2013) M. Zhang, R. Sekar, Control flow integrity for cots binaries, in Proceedings of the 22nd USENIX Security Symposium, pp. 337–352 (2013)
7.
go back to reference M. Abadi, M. Budiu, U. Erlingsson, J. Ligatti, Control-flow integrity, in Proceedings of the 12th ACM Conference on Computer and Communications security (ACM, 2005) pp. 340–353 M. Abadi, M. Budiu, U. Erlingsson, J. Ligatti, Control-flow integrity, in Proceedings of the 12th ACM Conference on Computer and Communications security (ACM, 2005) pp. 340–353
8.
go back to reference C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, W. Zou, Practical control flow integrity and randomization for binary executables, in Proceedings of the 34th IEEE Symposium on Security and Privacy, (IEEE, 2013) pp. 559–573 C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, W. Zou, Practical control flow integrity and randomization for binary executables, in Proceedings of the 34th IEEE Symposium on Security and Privacy, (IEEE, 2013) pp. 559–573
9.
go back to reference Y. Xia, Y. Liu, H. Chen, B. Zang, CFIMon: detecting violation of control flow integrity using performance counters, in Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE, 2012) pp. 1–12 Y. Xia, Y. Liu, H. Chen, B. Zang, CFIMon: detecting violation of control flow integrity using performance counters, in Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE, 2012) pp. 1–12
10.
go back to reference L. Davi, A.-R. Sadeghi, M. Winandy, ROPdefender: a detection tool to defend against return-oriented programming attacks, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (ACM, 2011) pp. 40–51 L. Davi, A.-R. Sadeghi, M. Winandy, ROPdefender: a detection tool to defend against return-oriented programming attacks, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (ACM, 2011) pp. 40–51
11.
go back to reference V. Pappas, M. Polychronakis, A.D. Keromytis, Transparent \(\{\)ROP\(\}\) exploit mitigation using indirect branch tracing, in Proceedings of the 22nd USENIX Security Symposium, pp. 447–462 (2013) V. Pappas, M. Polychronakis, A.D. Keromytis, Transparent \(\{\)ROP\(\}\) exploit mitigation using indirect branch tracing, in Proceedings of the 22nd USENIX Security Symposium, pp. 447–462 (2013)
12.
go back to reference M. Payer, A. Barresi, T.R. Gross, Fine-grained control-flow integrity through binary hardening, in Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, 2015), pp. 144–164 M. Payer, A. Barresi, T.R. Gross, Fine-grained control-flow integrity through binary hardening, in Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, 2015), pp. 144–164
13.
go back to reference J. Wilander, N. Nikiforakis, Y. Younan, M. Kamkar, W. Joosen, RIPE: runtime intrusion prevention evaluator, in Proceedings of the 27th Annual Computer Security Applications Conference (ACM, 2011), pp. 41–50 J. Wilander, N. Nikiforakis, Y. Younan, M. Kamkar, W. Joosen, RIPE: runtime intrusion prevention evaluator, in Proceedings of the 27th Annual Computer Security Applications Conference (ACM, 2011), pp. 41–50
14.
go back to reference T.H. Dang, P. Maniatis, D. Wagner, The performance cost of shadow stacks and stack canaries, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, vol. 15 (2015) T.H. Dang, P. Maniatis, D. Wagner, The performance cost of shadow stacks and stack canaries, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, vol. 15 (2015)
15.
go back to reference E. Göktas, E. Athanasopoulos, H. Bos, G. Portokalidis, Out of control: overcoming control-flow integrity, in Proceedings of the 35th IEEE Symposium on Security and Privacy (IEEE, 2014), pp. 575–589 E. Göktas, E. Athanasopoulos, H. Bos, G. Portokalidis, Out of control: overcoming control-flow integrity, in Proceedings of the 35th IEEE Symposium on Security and Privacy (IEEE, 2014), pp. 575–589
Metadata
Title
Control-Flow Integrity Enforcement with Dynamic Code Optimization
Author
Yan Lin
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-73141-0_5

Premium Partner