Back to Search
Start Over
G-free: Defeating return-oriented programming through gadget-less binaries
- Source :
- ACSAC '10 Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC
- Publication Year :
- 2010
- Publisher :
- ACM, 2010.
-
Abstract
- Conference name: ACSAC '10 Proceedings of the 26th Annual Computer Security Applications Conference Date of Conference: 06-10 December, 2010 Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of software systems and networks. A recent exploitation technique, called Return-Oriented Programming (ROP), has lately attracted a considerable attention from academia. Past research on the topic has mostly focused on refining the original attack technique, or on proposing partial solutions that target only particular variants of the attack. In this paper, we present G-Free, a compiler-based approach that represents the first practical solution against any possible form of ROP. Our solution is able to eliminate all unaligned free-branch instructions inside a binary executable, and to protect the aligned free-branch instructions to prevent them from being misused by an attacker. We developed a prototype based on our approach, and evaluated it by compiling GNU libc and a number of real-world applications. The results of the experiments show that our solution is able to prevent any form of return-oriented programming. © 2010 ACM.
- Subjects :
- Computer science
Program compilers
0211 other engineering and technologies
Security of data
Memory corruption
02 engineering and technology
computer.software_genre
Computer security
Security systems
Gadget
0202 electrical engineering, electronic engineering, information engineering
Return-oriented programming
Practical solutions
Software system
Software systems
Branch instructions
Operating systems
Control-flow integrity
021110 strategic, defence & security studies
Address space layout randomization
Real-world application
020207 software engineering
computer.file_format
Protection mechanisms
Computer operating systems
ROP
Return-to-libc
Compiler
Executable
Computer applications
computer
Exploitation techniques
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Journal :
- ACSAC '10 Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC
- Accession number :
- edsair.doi.dedup.....7ccb2bd96c04192bc58efee98c2dd705