Systematic Analysis of Defenses against Return-Oriented Programming

  • Richard Skowyra
  • Kelly Casteel
  • Hamed Okhravi
  • Nickolai Zeldovich
  • William Streilein
Conference paper

DOI: 10.1007/978-3-642-41284-4_5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8145)
Cite this paper as:
Skowyra R., Casteel K., Okhravi H., Zeldovich N., Streilein W. (2013) Systematic Analysis of Defenses against Return-Oriented Programming. In: Stolfo S.J., Stavrou A., Wright C.V. (eds) Research in Attacks, Intrusions, and Defenses. RAID 2013. Lecture Notes in Computer Science, vol 8145. Springer, Berlin, Heidelberg

Abstract

Since the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers makes it difficult to evaluate the effectiveness of defenses, and answer critical questions about the interoperability, composability, and efficacy of existing defensive techniques. For example, what combination of defenses protect against every known avenue of code reuse? What is the smallest set of such defenses? In this work, we study the space of code reuse attacks by building a formal model of attacks and their requirements, and defenses and their assumptions. We use a SAT solver to perform scenario analysis on our model in two ways. First, we analyze the defense configurations of a real-world system. Second, we reason about hypothetical defense bypasses. We prove by construction that attack extensions implementing the hypothesized functionality are possible even if a ‘perfect’ version of the defense is implemented. Our approach can be used to formalize the process of threat model definition, analyze defense configurations, reason about composability and efficacy, and hypothesize about new attacks and defenses.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Richard Skowyra
    • 1
  • Kelly Casteel
    • 2
  • Hamed Okhravi
    • 2
  • Nickolai Zeldovich
    • 3
  • William Streilein
    • 2
  1. 1.Boston UniversityUSA
  2. 2.MIT Lincoln LaboratoryUSA
  3. 3.MIT CSAILUSA

Personalised recommendations