A memory access validation scheme against payload injection attacks

Dongkyun Ahn, Gyungho Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    The authenticity of a piece of data or an instruction is crucial in mitigating threats from various forms of software attacks. In spite of various features against malicious attacks exploiting spurious data, adversaries have been successful in circumventing such protections. This paper proposes a memory access validation scheme that manages information on spurious data at the granularity of cache line size. A validation unit based on the proposed scheme answers queries from other components in the processor so that spurious data can be blocked before control flow diversion. We describe the design of this validation unit as well as its integration into the memory hierarchy of a modern processor and assess its memory requirement and performance impact with two simulators. The experimental results show that our scheme is able to detect the synthesized payload injection attacks and to manage taint information with moderate memory overhead under acceptable performance impact.

    Original languageEnglish
    Title of host publicationResearch in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings
    Pages107-126
    Number of pages20
    DOIs
    Publication statusPublished - 2012
    Event15th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2012 - Amsterdam, Netherlands
    Duration: 2012 Sept 122012 Sept 14

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume7462 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other15th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2012
    Country/TerritoryNetherlands
    CityAmsterdam
    Period12/9/1212/9/14

    Keywords

    • Code injection attack
    • Information flow tracking
    • Memory access validation
    • Return-oriented programming
    • Return-to-libc attack

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'A memory access validation scheme against payload injection attacks'. Together they form a unique fingerprint.

    Cite this