Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
Computers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era where there is so much sensitive data being stored, with cloud storage and huge customer databases, much has to be done to keep this data safe from intruders. C...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
Georgia Institute of Technology
2015
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/53994 |
id |
ndltd-GATECH-oai-smartech.gatech.edu-1853-53994 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-GATECH-oai-smartech.gatech.edu-1853-539942015-11-19T15:31:54ZHardware-assisted security: bloom cache – scalable low-overhead control flow integrity checkingYoung, VinsonSecurityBloom filterControl flow hijackingMemoryControl flow integrityComputers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era where there is so much sensitive data being stored, with cloud storage and huge customer databases, much has to be done to keep this data safe from intruders. Control flow hijacking attacks, stemming from a basic code injection attack to return-into-libc and other code re-use attacks, are among the most dangerous attacks. Currently available solutions, like Data execution prevention that can prevent a user from executing writable pages to prevent code injection attacks, do not have an efficient solution for protecting against code re-use attacks, which can execute valid code in a malicious order. To protect against control flow hijacking attacks, this work proposes architecture to make Control Flow Integrity, a solution that proposes to validate control flow against pre-computed control flow graph, practical. Current implementations of Control Flow Integrity have problems with code modularity, performance, or scalability, so I propose Dynamic Bloom Cache, a blocked-Bloom-filter-based approach, to solve current implementation issues.Georgia Institute of TechnologyKim, Jongman2015-09-21T15:51:25Z2015-09-22T05:30:06Z2014-082014-05-09August 20142015-09-21T15:51:25ZThesisapplication/pdfhttp://hdl.handle.net/1853/53994en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
topic |
Security Bloom filter Control flow hijacking Memory Control flow integrity |
spellingShingle |
Security Bloom filter Control flow hijacking Memory Control flow integrity Young, Vinson Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
description |
Computers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era where there is so much sensitive data being stored, with cloud storage and huge customer databases, much has to be done to keep this data safe from intruders.
Control flow hijacking attacks, stemming from a basic code injection attack to return-into-libc and other code re-use attacks, are among the most dangerous attacks. Currently available solutions, like Data execution prevention that can prevent a user from executing writable pages to prevent code injection attacks, do not have an efficient solution for protecting against code re-use attacks, which can execute valid code in a malicious order.
To protect against control flow hijacking attacks, this work proposes architecture to make Control Flow Integrity, a solution that proposes to validate control flow against pre-computed control flow graph, practical. Current implementations of Control Flow Integrity have problems with code modularity, performance, or scalability, so I propose Dynamic Bloom Cache, a blocked-Bloom-filter-based approach, to solve current implementation issues. |
author2 |
Kim, Jongman |
author_facet |
Kim, Jongman Young, Vinson |
author |
Young, Vinson |
author_sort |
Young, Vinson |
title |
Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
title_short |
Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
title_full |
Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
title_fullStr |
Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
title_full_unstemmed |
Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
title_sort |
hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking |
publisher |
Georgia Institute of Technology |
publishDate |
2015 |
url |
http://hdl.handle.net/1853/53994 |
work_keys_str_mv |
AT youngvinson hardwareassistedsecuritybloomcachescalablelowoverheadcontrolflowintegritychecking |
_version_ |
1718130953580183552 |