MagBox: Keep the risk functions running safely in a magic box

YongGang Li,GuoYuan Lin,Yeh-Ching Chung,YaoWen Ma,Yi Lu,Yu Bao
DOI: https://doi.org/10.1016/j.future.2022.10.035
IF: 7.307
2023-03-01
Future Generation Computer Systems
Abstract:Address space layout randomization (ASLR) has been widely deployed in operating systems (OS) to hide memory layout, which mitigates code reuse attacks (CRAs). Unfortunately, the memory probing techniques can still provide attackers with enough information to bypass ASLR. Although the control flow integrity (CFI) methods are not affected by code probing, they face the precision problem of control flow graphs (CFG). To make matters worse, most methods rely on the source code of the targets to be protected, which leads to their restrictions on the protection of the objects without source code. To solve these problems, MagBox is proposed in this paper. It identifies the risk functions that can provide gadgets for CRAs by detecting and analyzing attackers’ code probing activities. If the function is probed, it will be moved to a new address space. After that, the control flow transfers of the function will be tracked and analyzed in real time to judge their legitimacy. Experiment results and analysis show that MagBox can mitigate CRAs, and only introduces 3.4% performance overhead to the CPU.
computer science, theory & methods
What problem does this paper attempt to address?