Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (6): 135-145.doi: 10.11959/j.issn.2096-109x.2022086

• Papers and Reports • Previous Articles     Next Articles

Software diversity evaluation method based on the properties of ROP/JOP gadgets

Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2021-12-28 Online:2022-12-15 Published:2023-01-16
  • Supported by:
    The National Key R&D Program of China(2021YFB1006200);The National Key R&D Program of China(2021YFB1006201);TheNational Natural Science Foundation of China(62072467)

Abstract:

In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.

Key words: software diversification, ROP/JOP attack, gadgets properties, safety gain evaluation

CLC Number: 

No Suggested Reading articles found!