Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution

© 2004-2012 IEEE. In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [2] and return-to-libc attac...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2016-07, Vol.13 (4), p.437-450
Hauptverfasser: Volckaert, Stijn, Coppens, Bart, De Sutter, Bjorn
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 450
container_issue 4
container_start_page 437
container_title IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
container_volume 13
creator Volckaert, Stijn
Coppens, Bart
De Sutter, Bjorn
description © 2004-2012 IEEE. In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [2] and return-to-libc attacks [3]. DCL improves upon address space partitioning (ASP), an earlier technique presented to defeat memory exploits. Unlike ASP, our solution keeps the full virtual address space available to the protected program. Additionally, our combination of DCL with Multi-Variant Execution is transparent to both the user and the programmer and incurs much less overhead than other ROP defense tools, both in terms of run time and memory footprint.
format Article
fullrecord <record><control><sourceid>kuleuven</sourceid><recordid>TN_cdi_kuleuven_dspace_20_500_12942_693777</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>20_500_12942_693777</sourcerecordid><originalsourceid>FETCH-kuleuven_dspace_20_500_12942_6937773</originalsourceid><addsrcrecordid>eNqVzLsKwjAUgOEMCtbLO5xZqKQ3a92k1MsgiojgFEKNNTZNS3Pi5e1dfACd_uXj7xDHi8LIjZLY65G-MXdK_XCWhA7ZparWUhdwrm0LK34pBJo5pHXVKIECDrs9LBB5XsKmqqyW-IanxBtsrULpnngruUbIXiK3KGs9JN0rV0aMvh2Q8TI7pmu3tErYh9DsYhqeC-ZTFlHKPD8JfTZNgjiOgwGZ_IwZvjD46_4BcIRO2Q</addsrcrecordid><sourcetype>Institutional Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution</title><source>Lirias (KU Leuven Association)</source><source>IEEE Electronic Library (IEL)</source><creator>Volckaert, Stijn ; Coppens, Bart ; De Sutter, Bjorn</creator><creatorcontrib>Volckaert, Stijn ; Coppens, Bart ; De Sutter, Bjorn</creatorcontrib><description>© 2004-2012 IEEE. In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [2] and return-to-libc attacks [3]. DCL improves upon address space partitioning (ASP), an earlier technique presented to defeat memory exploits. Unlike ASP, our solution keeps the full virtual address space available to the protected program. Additionally, our combination of DCL with Multi-Variant Execution is transparent to both the user and the programmer and incurs much less overhead than other ROP defense tools, both in terms of run time and memory footprint.</description><identifier>ISSN: 1545-5971</identifier><language>eng</language><publisher>IEEE COMPUTER SOC</publisher><ispartof>IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016-07, Vol.13 (4), p.437-450</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,315,780,784,27860</link.rule.ids></links><search><creatorcontrib>Volckaert, Stijn</creatorcontrib><creatorcontrib>Coppens, Bart</creatorcontrib><creatorcontrib>De Sutter, Bjorn</creatorcontrib><title>Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution</title><title>IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING</title><description>© 2004-2012 IEEE. In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [2] and return-to-libc attacks [3]. DCL improves upon address space partitioning (ASP), an earlier technique presented to defeat memory exploits. Unlike ASP, our solution keeps the full virtual address space available to the protected program. Additionally, our combination of DCL with Multi-Variant Execution is transparent to both the user and the programmer and incurs much less overhead than other ROP defense tools, both in terms of run time and memory footprint.</description><issn>1545-5971</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>FZOIL</sourceid><recordid>eNqVzLsKwjAUgOEMCtbLO5xZqKQ3a92k1MsgiojgFEKNNTZNS3Pi5e1dfACd_uXj7xDHi8LIjZLY65G-MXdK_XCWhA7ZparWUhdwrm0LK34pBJo5pHXVKIECDrs9LBB5XsKmqqyW-IanxBtsrULpnngruUbIXiK3KGs9JN0rV0aMvh2Q8TI7pmu3tErYh9DsYhqeC-ZTFlHKPD8JfTZNgjiOgwGZ_IwZvjD46_4BcIRO2Q</recordid><startdate>20160701</startdate><enddate>20160701</enddate><creator>Volckaert, Stijn</creator><creator>Coppens, Bart</creator><creator>De Sutter, Bjorn</creator><general>IEEE COMPUTER SOC</general><scope>FZOIL</scope></search><sort><creationdate>20160701</creationdate><title>Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution</title><author>Volckaert, Stijn ; Coppens, Bart ; De Sutter, Bjorn</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kuleuven_dspace_20_500_12942_6937773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Volckaert, Stijn</creatorcontrib><creatorcontrib>Coppens, Bart</creatorcontrib><creatorcontrib>De Sutter, Bjorn</creatorcontrib><collection>Lirias (KU Leuven Association)</collection><jtitle>IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Volckaert, Stijn</au><au>Coppens, Bart</au><au>De Sutter, Bjorn</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution</atitle><jtitle>IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING</jtitle><date>2016-07-01</date><risdate>2016</risdate><volume>13</volume><issue>4</issue><spage>437</spage><epage>450</epage><pages>437-450</pages><issn>1545-5971</issn><abstract>© 2004-2012 IEEE. In this paper, we present disjoint code layouts (DCL), a technique that complements multi-variant execution [1] and W$\oplus$ X protection to effectively immunize programs against control flow hijacking exploits such as return oriented programming (ROP) [2] and return-to-libc attacks [3]. DCL improves upon address space partitioning (ASP), an earlier technique presented to defeat memory exploits. Unlike ASP, our solution keeps the full virtual address space available to the protected program. Additionally, our combination of DCL with Multi-Variant Execution is transparent to both the user and the programmer and incurs much less overhead than other ROP defense tools, both in terms of run time and memory footprint.</abstract><pub>IEEE COMPUTER SOC</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1545-5971
ispartof IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016-07, Vol.13 (4), p.437-450
issn 1545-5971
language eng
recordid cdi_kuleuven_dspace_20_500_12942_693777
source Lirias (KU Leuven Association); IEEE Electronic Library (IEL)
title Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T17%3A12%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kuleuven&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloning%20Your%20Gadgets:%20Complete%20ROP%20Attack%20Immunity%20with%20Multi-Variant%20Execution&rft.jtitle=IEEE%20TRANSACTIONS%20ON%20DEPENDABLE%20AND%20SECURE%20COMPUTING&rft.au=Volckaert,%20Stijn&rft.date=2016-07-01&rft.volume=13&rft.issue=4&rft.spage=437&rft.epage=450&rft.pages=437-450&rft.issn=1545-5971&rft_id=info:doi/&rft_dat=%3Ckuleuven%3E20_500_12942_693777%3C/kuleuven%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true