Institute of Computing Technology, Chinese Academy IR
Making Information Hiding Effective Again | |
Wang, Zhe1,2; Wu, Chenggang1,2; Zhang, Yinqian3; Tang, Bowen1,2; Yew, Pen-Chung4; Xie, Mengyao1,2; Lai, Yuanming1,2; Kang, Yan1,2; Cheng, Yueqiang5; Shi, Zhiping6,7 | |
2022-07-01 | |
发表期刊 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING |
ISSN | 1545-5971 |
卷号 | 19期号:4页码:2576-2594 |
摘要 | Information hiding (IH) is an important building block for many defenses against code reuse attacks, such as code-pointer integrity (CPI), control-flow integrity (CFI) and fine-grained code (re-)randomization, because of its effectiveness and performance. It employs randomization to probabilistically "hide" sensitive memory areas, called safe areas, from attackers and ensures their addresses are not leaked by any pointers directly. These defenses used safe areas to protect their critical data, such as jump targets and randomization secrets. However, recent works have shown that IH is vulnerable to various attacks. In this article, we propose a new IH technique called SafeHidden. It continuously re-randomizes the locations of safe areas and thus prevents the attackers from probing and inferring the memory layout to find its location. A new thread-private memory mechanism is proposed to isolate the thread-local safe areas and prevent adversaries from reducing the randomization entropy. It also randomizes the safe areas after the TLB misses to prevent attackers from inferring the address of safe areas using cache side-channels. Existing IH-based defenses can utilize SafeHidden directly without any change. Our experiments show that SafeHidden not only prevents existing attacks effectively but also incurs low performance overhead. |
关键词 | Instruction sets Registers Computer crashes Entropy Kernel Security Probes Side channel attacks information hiding intra-process memory isolation TLB misses |
DOI | 10.1109/TDSC.2021.3064086 |
收录类别 | SCI |
语种 | 英语 |
资助项目 | National High Technology Research and Development Program of China[2016QY07X1406] ; National Natural Science Foundation of China (NSFC)[61902374] ; National Natural Science Foundation of China (NSFC)[U1736208] ; NSF[CNS-1514444] |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Hardware & Architecture ; Computer Science, Information Systems ; Computer Science, Software Engineering |
WOS记录号 | WOS:000822381400001 |
出版者 | IEEE COMPUTER SOC |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://119.78.100.204/handle/2XEOYT63/19497 |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Wu, Chenggang |
作者单位 | 1.Chinese Acad Sci, Inst Comp Technol, State Key Lab Comp Architecture, Beijing 100864, Peoples R China 2.Univ Chinese Acad Sci, Beijing 100190, Peoples R China 3.Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA 4.Univ Minnesota Twin Cities, Dept Comp Sci & Engn, Minneapolis, MN 55455 USA 5.Baidu, Sunnyvale, CA 94089 USA 6.Capital Normal Univ, Coll Informat Engn, Beijing 100089, Peoples R China 7.Beijing Key Lab Light Ind Robot & Safety Verifica, Beijing 100048, Peoples R China |
推荐引用方式 GB/T 7714 | Wang, Zhe,Wu, Chenggang,Zhang, Yinqian,et al. Making Information Hiding Effective Again[J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2022,19(4):2576-2594. |
APA | Wang, Zhe.,Wu, Chenggang.,Zhang, Yinqian.,Tang, Bowen.,Yew, Pen-Chung.,...&Shi, Zhiping.(2022).Making Information Hiding Effective Again.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,19(4),2576-2594. |
MLA | Wang, Zhe,et al."Making Information Hiding Effective Again".IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 19.4(2022):2576-2594. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论