喵ID:CJUpm0免责声明

Protect the System Call, Protect (Most of) the World with BASTION

基本信息

DOI:
10.1145/3582016.3582066
发表时间:
2023-03
期刊:
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3
影响因子:
--
通讯作者:
Christopher Jelesnianski;Mohannad Ismail;Yeongjin Jang;Dan Williams;Changwoo Min
中科院分区:
其他
文献类型:
--
作者: Christopher Jelesnianski;Mohannad Ismail;Yeongjin Jang;Dan Williams;Changwoo Min研究方向: -- MeSH主题词: --
关键词: --
来源链接:pubmed详情页地址

文献摘要

System calls are a critical building block in many serious security attacks, such as control-flow hijacking and privilege escalation attacks. Security-sensitive system calls (e.g., execve, mprotect), especially play a major role in completing attacks. Yet, few defense efforts focus to ensure their legitimate usage, allowing attackers to maliciously leverage system calls in attacks. In this paper, we propose a novel System Call Integrity, which enforces the correct use of system calls throughout runtime. We propose three new contexts enforcing (1) which system call is called and how it is invoked (Call Type), (2) how a system call is reached (Control Flow), and (3) that arguments are not corrupted (Argument Integrity). Our defense mechanism thwarts attacks by breaking the critical building block in their attack chains. We implement BASTION, as a compiler and runtime monitor system, to demonstrate the efficacy of the three system call contexts. Our security case study shows that BASTION can effectively stop all the attacks including real-world exploits and recent advanced attack strategies. Deploying BASTION on three popular system call-intensive programs, NGINX, SQLite, and vsFTPd, we show BASTION is secure and practical, demonstrating overhead of 0.60%, 2.01%, and 1.65%, respectively.
系统调用是许多严重安全攻击(例如控制流劫持和权限提升攻击)中的关键构建块。对安全敏感的系统调用(例如execve、mprotect)尤其在完成攻击中起主要作用。然而,很少有防御措施专注于确保其合法使用,这使得攻击者能够在攻击中恶意利用系统调用。在本文中,我们提出了一种新颖的系统调用完整性机制,它在整个运行时强制正确使用系统调用。我们提出了三个新的上下文:(1)调用哪个系统调用以及如何调用它(调用类型),(2)如何到达系统调用(控制流),以及(3)参数未被破坏(参数完整性)。我们的防御机制通过打破攻击链中的关键构建块来阻止攻击。我们实现了BASTION,作为一个编译器和运行时监控系统,以展示这三个系统调用上下文的功效。我们的安全案例研究表明,BASTION可以有效地阻止所有攻击,包括现实世界中的漏洞利用和近期的高级攻击策略。在三个流行的系统调用密集型程序(NGINX、SQLite和vsFTPd)上部署BASTION,我们表明BASTION是安全且实用的,其开销分别为0.60%、2.01%和1.65%。
参考文献(78)
被引文献(3)

数据更新时间:{{ references.updateTime }}

关联基金

Collaborative Research: SHF: Small: Enabling Caches and GPUs for Energy Harvesting Systems
批准号:
2153748
批准年份:
2022
资助金额:
20
项目类别:
Standard Grant
Christopher Jelesnianski;Mohannad Ismail;Yeongjin Jang;Dan Williams;Changwoo Min
通讯地址:
--
所属机构:
--
电子邮件地址:
--
免责声明免责声明
1、猫眼课题宝专注于为科研工作者提供省时、高效的文献资源检索和预览服务;
2、网站中的文献信息均来自公开、合规、透明的互联网文献查询网站,可以通过页面中的“来源链接”跳转数据网站。
3、在猫眼课题宝点击“求助全文”按钮,发布文献应助需求时求助者需要支付50喵币作为应助成功后的答谢给应助者,发送到用助者账户中。若文献求助失败支付的50喵币将退还至求助者账户中。所支付的喵币仅作为答谢,而不是作为文献的“购买”费用,平台也不从中收取任何费用,
4、特别提醒用户通过求助获得的文献原文仅用户个人学习使用,不得用于商业用途,否则一切风险由用户本人承担;
5、本平台尊重知识产权,如果权利所有者认为平台内容侵犯了其合法权益,可以通过本平台提供的版权投诉渠道提出投诉。一经核实,我们将立即采取措施删除/下架/断链等措施。
我已知晓