Authors
Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger
Publication date
2016/3/21
Conference
2016 IEEE European Symposium on Security and Privacy (EuroS&P)
Pages
179-194
Publisher
IEEE
Description
Modern systems assume that privileged software always behaves as expected, however, such assumptions may not hold given the prevalence of kernel vulnerabilities. One idea is to employ defenses to restrict how adversaries may exploit such vulnerabilities, such as Control-Flow Integrity (CFI), which restricts execution to a Control-Flow Graph (CFG). However, proposed applications of CFI enforcement to kernel software are too coarse-grained to restrict the adversary effectively and either fail to enforce CFI comprehensively or are very expensive. We present a mostly-automated approach for retrofitting kernel software that leverages features of such software to enable comprehensive, efficient, fine-grained CFI enforcement. We achieve this goal by leveraging two insights. We first leverage the conservative function pointer usage patterns found in the kernel source code to develop a method to compute fine-grained …
Total citations
20162017201820192020202120222023202432321202113172615
Scholar articles
X Ge, N Talele, M Payer, T Jaeger - 2016 IEEE European Symposium on Security and …, 2016