Undermining information hiding (and what to do about it)

Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

56 Scopus citations

Abstract

In the absence of hardware-supported segmentation, many state-of-the-art defenses resort to “hiding” sensitive information at a random location in a very large address space. This paper argues that information hiding is a weak isolation model and shows that attackers can find hidden information, such as CPI’s SafeStacks, in seconds—by means of thread spraying. Thread spraying is a novel attack technique which forces the victim program to allocate many hidden areas. As a result, the attacker has a much better chance to locate these areas and compromise the defense. We demonstrate the technique by means of attacks on Firefox, Chrome, and MySQL. In addition, we found that it is hard to remove all sensitive information (such as pointers to the hidden region) from a program and show how residual sensitive information allows attackers to bypass defenses completely. We also show how we can harden information hiding techniques by means of an Authenticating Page Mapper (APM) which builds on a user-level page-fault handler to authenticate arbitrary memory reads/writes in the virtual address space. APM bootstraps protected applications with a minimum-sized safe area. Every time the program accesses this area, APM authenticates the access operation, and, if legitimate, expands the area on demand. We demonstrate that APM hardens information hiding significantly while increasing the overhead, on average, 0.3% on baseline SPEC CPU 2006, 0.0% on SPEC with SafeStack and 1.4% on SPEC with CPI.

Original languageEnglish
Title of host publicationProceedings of the 25th USENIX Security Symposium
Pages105-119
Number of pages15
ISBN (Electronic)9781931971324
StatePublished - 2016
Event25th USENIX Security Symposium - Austin, United States
Duration: 10 Aug 201612 Aug 2016

Publication series

NameProceedings of the 25th USENIX Security Symposium

Conference

Conference25th USENIX Security Symposium
Country/TerritoryUnited States
CityAustin
Period10/08/1612/08/16

Fingerprint

Dive into the research topics of 'Undermining information hiding (and what to do about it)'. Together they form a unique fingerprint.

Cite this