Leakage-resilient layout randomization for mobile devices

Braden, Kjell; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Sadegh, Ahmad-Reza
NDSS 2016, Network and Distributed System Security Symposium, 21-24 February 2016, San Diego, CA, USA

Attack techniques based on code reuse continue to enable real-world exploits bypassing all current mitigations. Code randomization defenses greatly improve resilience against code reuse. Unfortunately, sophisticated modern attacks such as JIT-ROP can circumvent randomization by discovering the actual code layout on the target and relocating the attack payload on the fly. Hence, effective code randomization additionally requires that the code layout cannot be leaked to adversaries. Previous approaches to leakage-resilient diversity have either relied on hardware features that are not available in all processors, particularly resource-limited processors commonly found in mobile devices, or they have had high memory overheads. We introduce a code randomization technique that avoids these limitations and scales down to mobile and embedded devices: Leakage-Resilient Layout Randomization (LR2). Whereas previous solutions have relied on virtualization, x86 segmentation, or virtual memory support, LR2 merely requires the underlying processor to enforce a WX policy--a feature that is virtually ubiquitous in modern processors, including mobile and embedded variants. Our evaluation shows that LR2 provides the same security as existing virtualization-based solutions while avoiding design decisions that would prevent deployment on less capable yet equally vulnerable systems. Although we enforce execute-only permissions in software, LR2 is as efficient as the best-in-class virtualization-based solution

DOI
Type:
Conference
City:
San Diego
Date:
2016-02-21
Department:
Digital Security
Eurecom Ref:
4797
Copyright:
© ISOC. Personal use of this material is permitted. The definitive version of this paper was published in NDSS 2016, Network and Distributed System Security Symposium, 21-24 February 2016, San Diego, CA, USA and is available at : http://dx.doi.org/10.14722/ndss.2016.23364

PERMALINK : https://www.eurecom.fr/publication/4797