Data Is Flowing in the Winda Review of Data-Flow Integrity Methods to Overcome Non-Control-Data Attacks

  1. Irene Díez-Franco 1
  2. Igor Santos 1
  1. 1 Universidad de Deusto
    info

    Universidad de Deusto

    Bilbao, España

    ROR https://ror.org/00ne6sr39

Liburua:
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16: San Sebastián, Spain, October 19th-21st, 2016 Proceedings
  1. Manuel Graña (coord.)
  2. José Manuel López-Guede (coord.)
  3. Oier Etxaniz (coord.)
  4. Álvaro Herrero (coord.)
  5. Héctor Quintián (coord.)
  6. Emilio Corchado (coord.)

Argitaletxea: Springer Suiza

ISBN: 978-3-319-47364-2 3-319-47364-6 978-3-319-47363-5 3-319-47363-8

Argitalpen urtea: 2017

Orrialdeak: 536-546

Biltzarra: International Conference on Computational Intelligence in Security for Information Systems (9. 2016. San Sebastián)

Mota: Biltzar ekarpena

Laburpena

Security researchers have been focusing on developing mitigation and protection mechanisms against code-injection and code-reuse attacks. Modern defences focus on protecting the legitimate control-flowof a program, nevertheless they cannot withstand a more subtle type of attack, non-control-data attacks, since they follow the legitimate control flow, and thus leave no trace. Data-Flow Integrity(DFI) is a defence mechanism which aims to protect programs against non-control-data attacks. DFI uses static analysis to compute the data-flow graph of a program, and then, enforce at runtime that the data-flow of the program follows the legitimate path; otherwise the execution is aborted.In this paper, we review the state of the techniques to generate non-control-data attacks and present the state of DFI methods.