DocumentCode :
2923572
Title :
CFIMon: Detecting violation of control flow integrity using performance counters
Author :
Xia, Yubin ; Liu, Yutao ; Chen, Haibo ; Zang, Binyu
Author_Institution :
Inst. of Parallel & Distrib. Syst., Shanghai Jiao Tong Univ., Shanghai, China
fYear :
2012
fDate :
25-28 June 2012
Firstpage :
1
Lastpage :
12
Abstract :
Many classic and emerging security attacks usually introduce illegal control flow to victim programs. This paper proposes an approach to detecting violation of control flow integrity based on hardware support for performance monitoring in modern processors. The key observation is that the abnormal control flow in security breaches can be precisely captured by performance monitoring units. Based on this observation, we design and implement a system called CFIMon, which is the first non-intrusive system that can detect and reason about a variety of attacks violating control flow integrity without any changes to applications (either source or binary code) or requiring special-purpose hardware. CFIMon combines static analysis and runtime training to collect legal control flow transfers, and leverages the branch tracing store mechanism in commodity processors to collect and analyze runtime traces on-the-fly to detect violation of control flow integrity. Security evaluation shows that CFIMon has low false positives or false negatives when detecting several realistic security attacks. Performance results show that CFIMon incurs only 6.1% performance overhead on average for a set of typical server applications.
Keywords :
performance evaluation; security of data; CFIMon; abnormal control flow capture; branch tracing store mechanism; commodity processors; control flow integrity violation detection; hardware support; illegal control flow; legal control flow transfer collection; nonintrusive system; performance counters; performance monitoring units; runtime traces on-the-fly analysis; runtime traces on-the-fly collection; runtime training; security attacks; security breaches; server applications; static analysis; victim programs; Law; Monitoring; Program processors; Radiation detectors; Runtime; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on
Conference_Location :
Boston, MA
ISSN :
1530-0889
Print_ISBN :
978-1-4673-1624-8
Electronic_ISBN :
1530-0889
Type :
conf
DOI :
10.1109/DSN.2012.6263958
Filename :
6263958
Link To Document :
بازگشت