Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model

08/27/2021
by   Zhilong Wang, et al.
0

As control-flow protection methods get widely deployed it is difficult for attackers to corrupt control data to build attacks. Instead, data-oriented exploits, which modify non-control data for malicious goals, have been demonstrated to be possible and powerful. To defend against data-oriented exploits, the first fundamental step is to identify non-control, security-critical data. However, previous works mainly rely on tedious human efforts to identify critical data, which cannot handle large applications nor easily port to new programs. In this work, we investigate the application of deep learning to critical data identification. This work provides non-intuitive understanding about (a) why straightforward ways of applying deep learning would fail, and (b) how deep learning should be applied in identifying critical data. Based on our insights, we have discovered a non-intuitive method which combines Tree-LSTM models and a novel structure of data-flow tree to effectively identify critical data from execution traces. The evaluation results show that our method can achieve 87.47 baselines. To the best of our knowledge, this is the first work using a deep neural model to identify critical data in program binaries.

READ FULL TEXT
research
02/22/2019

Exploitation Techniques and Defenses for Data-Oriented Attacks

Data-oriented attacks manipulate non-control data to alter a program's b...
research
04/19/2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

Industrial Control Systems (ICSs) rely on insecure protocols and devices...
research
12/12/2019

Using Deep Learning to Solve Computer Security Challenges: A Survey

Although using machine learning techniques to solve computer security ch...
research
10/20/2021

RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks

CPU registers are small discrete storage units, used to hold temporary d...
research
02/14/2018

Convolutional Neural Networks over Control Flow Graphs for Software Defect Prediction

Existing defects in software components is unavoidable and leads to not ...
research
07/24/2023

ChatGPT for Software Security: Exploring the Strengths and Limitations of ChatGPT in the Security Applications

ChatGPT, as a versatile large language model, has demonstrated remarkabl...
research
07/18/2023

Newtonian Program Analysis of Probabilistic Programs

Due to their quantitative nature, probabilistic programs pose non-trivia...

Please sign up or login with your details

Forgot password? Click here to reset