Title
Leveraging Optimization Methods for Dynamically Assisted Control-Flow Integrity Mechanisms
Abstract
Dynamic Binary Modification (DBM) tools are useful for cross-platform execution of binaries and are powerful run time environments that allow execution optimizations, instrumentation and profiling. These tools have also been used as enablers for control-flow integrity verification, a process that consists in the observation and analysis of a program's execution path focusing on the detection of anomalies, such as those arising from flow corruption based software attacks. Even though this class of tools helps us in identifying a myriad of attacks, it is typically expensive at run time and introduce significant overhead to the program execution. Considering their inherent high cost, further expanding the capabilities of such tools for detection of program flow anomalies can slow down the analysis to the point that it is unfeasible to run it in real world workflows. In this paper we present a mechanism for including program flow verification in DBMs that uses asynchronous analysis and applies different parallel-programming techniques that leverage current multi-core systems to control the overhead of our analysis. Our mechanism was tested against synthetic program flow corruption use cases and correctly detected all detours. With our new optimizations, we show that our system achieves an slowdown of only 1.46x, while a naively implemented verification system face 4.22x of overhead.
Year
DOI
Venue
2014
10.1109/SBAC-PAD.2014.35
Computer Architecture and High Performance Computing
Keywords
DocType
ISSN
multiprocessing systems,parallel programming,program control structures,program diagnostics,program verification,security of data,software tools,DBM tools,asynchronous analysis,control-flow integrity verification,cross-platform execution,dynamic binary modification tools,dynamically assisted control-flow integrity mechanisms,flow corruption based software attacks,multicore systems,optimization methods,parallel-programming techniques,program execution path,program flow anomaly detection,program flow verification,run time environments,synthetic program flow corruption,verification system
Conference
1550-6533
Citations 
PageRank 
References 
0
0.34
15
Authors
4
Name
Order
Citations
PageRank
João Moreira100.34
Lucas Teixeira2306.93
Edson Borin312.71
Sandro Rigo418524.91