Journal on Communications ›› 2021, Vol. 42 ›› Issue (1): 37-47.doi: 10.11959/j.issn.1000-436x.2021013

• Papers • Previous Articles     Next Articles

Method against process control-flow hijacking based on mimic defense

Chuanxing PAN1, Zheng ZHANG1, Bolin MA2, Yuan YAO1, Xinsheng JI2   

  1. 1 State Key Laboratory of Mathmatical Engineering and Advanced Computing, Zhengzhou 450001, China
    2 National Digital Switching System Engineering & Technological Research Center, Zhengzhou 450002, China
  • Revised:2020-11-05 Online:2021-01-25 Published:2021-01-01
  • Supported by:
    The National Natural Science Foundation of China(61521003)

Abstract:

To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of process mimic execution was proposed, and the threat model was analyzed and proved to be effective.Mimic execution could effectively cut off the attack path of control flow hijacking.The ptototype of mimic execution, MimicBox, was implemented.The validation experiment shows that MimicBox can effectively defend against most control flow hijacking attacks based on known binary vulnerabilities.The performance evaluation result shows that the overhead MimicBox lead to is less than 13% on CPU-intensive programs.The Comparative evaluation result shows that mimic execution is a more effective and practical active defense method compared with control flow integrity.

Key words: control-flow hijacking, mimic defense, mimic execution, prototype, evaluation

CLC Number: 

No Suggested Reading articles found!