2016 IEEE European Symposium on Security and Privacy (EuroS&P) 2016
DOI: 10.1109/eurosp.2016.24
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Control-Flow Integrity for Kernel Software

Abstract: Modern systems assume that privileged software always behaves as expected, however, such assumptions may not hold given the prevalence of kernel vulnerabilities. One idea is to employ defenses to restrict how adversaries may exploit such vulnerabilities, such as Control-Flow Integrity (CFI), which restricts execution to a Control-Flow Graph (CFG). However, proposed applications of CFI enforcement to kernel software are too coarse-grained to restrict the adversary effectively and either fail to enforce CFI comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
59
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(77 citation statements)
references
References 27 publications
0
59
0
1
Order By: Relevance
“…This approach can be applied to a wider range of kernel software and prevents more attacks than KRGuard. On the other hand, as mentioned above, because KRGuard deploys the hardware function LBR and limits the target function, the overhead of KRGuard is smaller than that of [13]. In addition, we think that KRGuard can easily be applied to the Linux kernel because the mechanism is very simple.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…This approach can be applied to a wider range of kernel software and prevents more attacks than KRGuard. On the other hand, as mentioned above, because KRGuard deploys the hardware function LBR and limits the target function, the overhead of KRGuard is smaller than that of [13]. In addition, we think that KRGuard can easily be applied to the Linux kernel because the mechanism is very simple.…”
Section: Related Workmentioning
confidence: 98%
“…Ge et al [13] proposed a mostly automated approach to produce and enforce fine-grained CFI policies comprehensively for kernel software with low overhead. This approach can be applied to a wider range of kernel software and prevents more attacks than KRGuard.…”
Section: Related Workmentioning
confidence: 99%
“…Further, we are particularly interested in calltarget reduction analysis as this is the most used metric (see AIR [59], fAIR [49], and AIA [16] -however, these metrics average the results) to compare CFI defenses against each other. At the time of writing this paper, none of the existing CFI metrics can tell how secure a program is after a certain CFI policy was applied; as such, we do not claim that by using our CT R metric we can provide more security guarantees than other metrics, but rather CT R provides absolute values rather than averaging them.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to securing user-level application software against such threats, it has also been applied to harden smartphones [14,39,49], embedded systems [3], hypervisors [63], and operating system kernels [13,25,33]. CFI-enforcing hardware is also being investigated [15,16,18,24,28,42,68,70].…”
Section: Scalabilitymentioning
confidence: 99%