Securely Sharing Randomized Code That Flies

dc.contributor.authorJelesnianski, Christopheren
dc.contributor.authorYom, Jinwooen
dc.contributor.authorMin, Changwooen
dc.contributor.authorJang, Yeongjinen
dc.date.accessioned2023-02-23T13:34:38Zen
dc.date.available2023-02-23T13:34:38Zen
dc.date.issued2022-09-12en
dc.date.updated2023-02-23T02:01:04Zen
dc.description.abstractAddress space layout randomization was a great role model, being a light-weight defense technique that could prevent early return-oriented programming attacks. Simple yet effective, address space layout randomization was quickly widely adopted. Conversely, today only a trickle of defense techniques arebeing integrated or adopted mainstream. As code reuse attacks have evolved in complexity, defenses have strived to keep up. However, to do so, many have had to take unfavorable tradeoffs like using background threads or protecting only a subset of sensitive code. In reality, these tradeoffs were unavoidable steps necessary to improve the strength of the state of the art. In this article, we present Mardu, an on-demand system-wide runtime re-randomization technique capable of scalable protection of application as well as shared library code that most defenses have forgone. We achieve code sharing with diversification by implementing reactive and scalable rather than continuous or one-time diversification. Enabling code sharing further removes redundant computation like tracking and patching, along with memory overheads required by prior randomization techniques. In its baseline state, the code transformations needed for Mardu security hardening incur a reasonable performance overhead of 5.5% on SPEC and minimal degradation of 4.4% in NGINX, demonstrating its applicability to both compute-intensive and scalable real-world applications. Even when under attack, Mardu only adds from less than 1% to up to 15% depending on application size and complexity.en
dc.description.versionPublished versionen
dc.format.extentPages 1-25en
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1145/3474558en
dc.identifier.eissn2576-5337en
dc.identifier.issn2692-1626en
dc.identifier.issue3en
dc.identifier.orcidMin, Chang Woo [0000-0001-6225-5357]en
dc.identifier.urihttp://hdl.handle.net/10919/113917en
dc.identifier.volume3en
dc.language.isoenen
dc.publisherACMen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectSystems securityen
dc.titleSecurely Sharing Randomized Code That Fliesen
dc.title.serialDigital Threats: Research and Practiceen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
dc.type.otherJournal Articleen
pubs.organisational-group/Virginia Techen
pubs.organisational-group/Virginia Tech/Engineeringen
pubs.organisational-group/Virginia Tech/Engineering/Electrical and Computer Engineeringen
pubs.organisational-group/Virginia Tech/All T&R Facultyen
pubs.organisational-group/Virginia Tech/Engineering/COE T&R Facultyen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3474558.pdf
Size:
2.65 MB
Format:
Adobe Portable Document Format
Description:
Published version