Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking

Computers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era where there is so much sensitive data being stored, with cloud storage and huge customer databases, much has to be done to keep this data safe from intruders. C...

Full description

Bibliographic Details
Main Author: Young, Vinson
Other Authors: Kim, Jongman
Format: Others
Language:en_US
Published: Georgia Institute of Technology 2015
Subjects:
Online Access:http://hdl.handle.net/1853/53994
id ndltd-GATECH-oai-smartech.gatech.edu-1853-53994
record_format oai_dc
spelling ndltd-GATECH-oai-smartech.gatech.edu-1853-539942015-11-19T15:31:54ZHardware-assisted security: bloom cache – scalable low-overhead control flow integrity checkingYoung, VinsonSecurityBloom filterControl flow hijackingMemoryControl flow integrityComputers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era where there is so much sensitive data being stored, with cloud storage and huge customer databases, much has to be done to keep this data safe from intruders. Control flow hijacking attacks, stemming from a basic code injection attack to return-into-libc and other code re-use attacks, are among the most dangerous attacks. Currently available solutions, like Data execution prevention that can prevent a user from executing writable pages to prevent code injection attacks, do not have an efficient solution for protecting against code re-use attacks, which can execute valid code in a malicious order. To protect against control flow hijacking attacks, this work proposes architecture to make Control Flow Integrity, a solution that proposes to validate control flow against pre-computed control flow graph, practical. Current implementations of Control Flow Integrity have problems with code modularity, performance, or scalability, so I propose Dynamic Bloom Cache, a blocked-Bloom-filter-based approach, to solve current implementation issues.Georgia Institute of TechnologyKim, Jongman2015-09-21T15:51:25Z2015-09-22T05:30:06Z2014-082014-05-09August 20142015-09-21T15:51:25ZThesisapplication/pdfhttp://hdl.handle.net/1853/53994en_US
collection NDLTD
language en_US
format Others
sources NDLTD
topic Security
Bloom filter
Control flow hijacking
Memory
Control flow integrity
spellingShingle Security
Bloom filter
Control flow hijacking
Memory
Control flow integrity
Young, Vinson
Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
description Computers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era where there is so much sensitive data being stored, with cloud storage and huge customer databases, much has to be done to keep this data safe from intruders. Control flow hijacking attacks, stemming from a basic code injection attack to return-into-libc and other code re-use attacks, are among the most dangerous attacks. Currently available solutions, like Data execution prevention that can prevent a user from executing writable pages to prevent code injection attacks, do not have an efficient solution for protecting against code re-use attacks, which can execute valid code in a malicious order. To protect against control flow hijacking attacks, this work proposes architecture to make Control Flow Integrity, a solution that proposes to validate control flow against pre-computed control flow graph, practical. Current implementations of Control Flow Integrity have problems with code modularity, performance, or scalability, so I propose Dynamic Bloom Cache, a blocked-Bloom-filter-based approach, to solve current implementation issues.
author2 Kim, Jongman
author_facet Kim, Jongman
Young, Vinson
author Young, Vinson
author_sort Young, Vinson
title Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
title_short Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
title_full Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
title_fullStr Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
title_full_unstemmed Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
title_sort hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking
publisher Georgia Institute of Technology
publishDate 2015
url http://hdl.handle.net/1853/53994
work_keys_str_mv AT youngvinson hardwareassistedsecuritybloomcachescalablelowoverheadcontrolflowintegritychecking
_version_ 1718130953580183552