• Complain

Yan Lin - Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)

Here you can read online Yan Lin - Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Yan Lin Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)
  • Book:
    Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)
  • Author:
  • Publisher:
    Springer
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks.
In this book, we propose novel solutions to handle these three fundamental components. To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.

Yan Lin: author's other books


Who wrote Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Novel Techniques in Recovering Embedding and Enforcing Policies - photo 1
Book cover of Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Information Security and Cryptography
Series Editors
David Basin
Dept. of Computer Science F 106, ETH Zrich, Zrich, Switzerland
Kenny Paterson
Information Security Group, Royal Holloway, University of London, Egham, Surrey, UK
Editorial Board
Michael Backes
Dept. of Computer Science, Saarland University, Saarbrcken, Saarland, Germany
Gilles Barthe
IMDEA Software Institute, Pozuelo de Alarcn, Madrid, Spain
Ronald Cramer
CWI, Amsterdam, The Netherlands
Ivan Damgrd
Department of Computer Science, Aarhus University, Aarhus, Denmark
Robert H. Deng
Singapore Management University, Singapore, Singapore
Christopher Kruegel
Dept. of Computer Science, University of California, Santa Barbara, Santa Barbara, CA, USA
Tatsuaki Okamoto
Okamoto Research Lab., NTT Secure Platform Laboratories, Musashino-shi, Tokyo, Japan
Adrian Perrig
CAB F 85.1, ETH Zurich, Zrich, Switzerland
Bart Preneel
Dept. Elektrotechniek-ESAT /COSIC, University of Leuven, Leuven, Belgium
Carmela Troncoso
Security and Privacy Engineering Lab, cole Polytechnique Fdrale de Lausa, Lausanne, Switzerland
Moti Yung
Google Inc, New York, NY, USA

Information Security protecting information in potentially hostile environments is a crucial factor in the growth of information-based processes in industry, business, and administration. Cryptography is a key technology for achieving information security in communications, computer systems, electronic commerce, and in the emerging information society.

Springers Information Security & Cryptography (IS&C) book series covers all relevant topics, ranging from theory to advanced applications. The intended audience includes students, researchers and practitioners.

More information about this series at http://www.springer.com/series/4752

Yan Lin
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
1st ed. 2021
Logo of the publisher Yan Lin School of Computing and Information Systems - photo 2
Logo of the publisher
Yan Lin
School of Computing and Information Systems, Singapore Management University, Singapore, Singapore
ISSN 1619-7100 e-ISSN 2197-845X
Information Security and Cryptography
ISBN 978-3-030-73140-3 e-ISBN 978-3-030-73141-0
https://doi.org/10.1007/978-3-030-73141-0
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

This book is an introduction on how to make Control-Flow Integrity (CFI) fine-grained, practical, and efficient. CFI is an attractive security property with which most injected and code-reuse attacks can be defeated. Most CFI approaches use a coarse-grained policy, rely on memory page protection mechanism, and result in a large runtime overhead. This book is for those who want to explore more in the world of cybersecurity and want to have a better understanding of CFI.

An important aim of the book is to make readers have a basic concept on what CFI is, why we need it, and the issues for current CFI enforcements. The book is written and presented in a way that is directly accessible to all kinds of readers, no matter you are experts or freshmen in cybersecurity.

The book provides an overview of what CFI is and the issues of current enforcements. The readers can have a detailed understanding on why CFI is important in cybersecurity compared to other security enforcements. Each chapter discusses one possible issue of current CFI implementation and presents the corresponding solution. The reader can get more details about how CFI works from them and broaden their mind to find new solutions to mitigate these limitations.

Yan Lin
Singapore
Contents
List of Figures
List of Tables
The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
Y. Lin Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity Information Security and Cryptography https://doi.org/10.1007/978-3-030-73141-0_1
1. Introduction
Yan Lin
(1)
School of Information Systems, Singapore Management University, Singapore, Singapore
Yan Lin
Email:

In this chapter, we first introduce concepts and implementations of Control-Flow Integrity [], which is a fundamental approach to mitigating control-flow hijacking attacks, and then present practical issues of previous CFI systems and summarize how we address those problems.

1.1 Overview of Control-Flow Integrity

Application is often written in memory-unsafe languages; this makes it prone to memory errors that are the primary attack vector to subvert systems. Many protection mechanisms including DEP (Data Execution Prevention [].

Natural protection against control-flow hijacking attacks is to enforce CFI (Control-Flow Integrity []. Next, a CFI check is inserted for indirect branches (e.g., indirect calls, indirect jumps, and returns). These checks ensure that all executed branches correspond to edges in the CFG at runtime. For instance, the valid targets of node 3 can only be either 5 or 6. If the adversary aims to redirect execution to node 4, CFI will immediately terminate the program execution.

Despite CFIs efficacy, it has not seen wide adoption. We believe that not well supporting some critical features contributes to CFIs poor deployment.
Fig 11 Example of control-flow integrity First of all having an accurate - photo 3
Fig. 1.1

Example of control-flow integrity

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)»

Look at similar books to Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)»

Discussion, reviews of the book Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.