Publication: Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing
Open/View Files
Date
2011
Published Version
Journal Title
Journal ISSN
Volume Title
Publisher
Association for Computing Machinery
The Harvard community has made this article openly available. Please share how this access benefits you.
Citation
Zeng, Bin, Gang Tan, and J. Greg Morrisett. 2011. Combining control-flow integrity and static analysis for efficient and validated data sandboxing. In CCS '11 Proceedings of the 18th ACM conference on Computer and communications security: Chicago, Illinois, October 17-21, 2011, ed. Yan Chen, George Danezis, and Vitaly Shmatikov, 29-40. New York, NY: Association for Computing Machinery.
Research Data
Abstract
In many software attacks, inducing an illegal control-flow transfer in the target system is one common step. Control-Flow Integrity (CFI) protects a software system by enforcing a pre-determined control-flow graph. In addition to providing strong security, CFI enables static analysis on low-level code. This paper evaluates whether CFI-enabled static analysis can help build efficient and validated data sandboxing. Previous systems generally sandbox memory writes for integrity, but avoid protecting confidentiality due to the high overhead of sandboxing memory reads. To reduce overhead, we have implemented a series of optimizations that remove sandboxing instructions if they are proven unnecessary by static analysis. On top of CFI, our system adds only 2.7% runtime overhead on SPECint2000 for sandboxing memory writes and adds modest 19% for sandboxing both reads and writes. We have also built a principled data-sandboxing verifier based on range analysis. The verifier checks the safety of the results of the optimizer, which removes the need to trust the rewriter and optimizer. Our results show that the combination of CFI and static analysis has the potential of bringing down the cost of general inlined reference monitors, while maintaining strong security.
Description
Other Available Sources
Keywords
security, verification, control-flow integrity, static analysis, binary rewriting, inlined reference monitors
Terms of Use
This article is made available under the terms and conditions applicable to Open Access Policy Articles (OAP), as set forth at Terms of Service