{"title":"Effective Control Flow Integrity Checks for Intrusion Detection","authors":"A. Chaudhari, J. Abraham","doi":"10.1109/IOLTS.2018.8474130","DOIUrl":null,"url":null,"abstract":"Ensuring run time Control Flow Integrity (CFI) has proven to be a good way to detect and prevent intrusions which result from exploitation of unknown vulnerabilities in the software. Attackers need to change the control flow and/or the code text of the victim application to achieve their malicious intent. However, existing techniques for monitoring run time CFI have been impractical due to their large software and hardware costs. In this paper, we describe a practical hardware based approach at a fine granularity to ensure integrity of code and the control flow of an executing application. We utilize the low power benefits and randomness of a stream cipher based hash, combined with the efficient hardware based monitoring, to provide a practical and functional defense against intrusion attacks.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOLTS.2018.8474130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Ensuring run time Control Flow Integrity (CFI) has proven to be a good way to detect and prevent intrusions which result from exploitation of unknown vulnerabilities in the software. Attackers need to change the control flow and/or the code text of the victim application to achieve their malicious intent. However, existing techniques for monitoring run time CFI have been impractical due to their large software and hardware costs. In this paper, we describe a practical hardware based approach at a fine granularity to ensure integrity of code and the control flow of an executing application. We utilize the low power benefits and randomness of a stream cipher based hash, combined with the efficient hardware based monitoring, to provide a practical and functional defense against intrusion attacks.