Control Flow Integrity & Software Fault Isolation. David Brumley Carnegie Mellon University

Similar documents
0x1A Great Papers in Computer Security

Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI)

Efficient Software Based Fault Isolation. Software Extensibility

Securing Untrusted Code

Confinement (Running Untrusted Programs)

Module: Return-oriented Programming. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Inline Reference Monitoring Techniques

Control Flow Integrity

Module: Return-oriented Programming. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Lecture Notes for 04/04/06: UNTRUSTED CODE Fatima Zarinni.

ISOLATION DEFENSES GRAD SEC OCT

CS 6V Control-Flow Integrity Principles, Implementations, and Applications. Sureshbabu Murugesan

Inject malicious code Call any library functions Modify the original code

Runtime Defenses against Memory Corruption

CSE 227 Computer Security Spring 2010 S f o t ftware D f e enses I Ste St f e an f Sa v Sa a v g a e g

Software Security: Vulnerability Analysis

Honours/Master/PhD Thesis Projects Supervised by Dr. Yulei Sui

Sandboxing. CS-576 Systems Security Instructor: Georgios Portokalidis Spring 2018

SECURING SOFTWARE AGAINST LIBRARY ATTACKS

Shuffler: Fast and Deployable Continuous Code Re-Randomization

CSE 127: Computer Security. Memory Integrity. Kirill Levchenko

Module: Advanced Program Vulnerabilities and Defenses. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Software Security: Buffer Overflow Defenses

4. Jump to *RA 4. StackGuard 5. Execute code 5. Instruction Set Randomization 6. Make system call 6. System call Randomization

INFLUENTIAL OPERATING SYSTEM RESEARCH: SECURITY MECHANISMS AND HOW TO USE THEM CARSTEN WEINHOLD

6.828: OS/Language Co-design. Adam Belay

ARMlock: Hardware-based Fault Isolation for ARM

Software Security: Buffer Overflow Attacks (continued)

BlackBox. Lightweight Security Monitoring for COTS Binaries. Byron Hawkins and Brian Demsky University of California, Irvine, USA

Software Vulnerabilities August 31, 2011 / CS261 Computer Security

Memory Protection. Philip W. L. Fong. CPSC 525/625 (Winter 2018) Department of Computer Science University of Calgary Calgary, Alberta, Canada

Countermeasures in Modern Operating Systems. Yves Younan, Vulnerability Research Team (VRT)

Reusable Tools for Formal Modeling of Machine Code

A survey of Hardware-based Control Flow Integrity (CFI)

Outline. Heap meta-data. Non-control data overwrite

CS 161 Computer Security

Language Techniques for Provably Safe Mobile Code

Beyond Stack Smashing: Recent Advances in Exploiting. Jonathan Pincus(MSR) and Brandon Baker (MS)

Portable Software Fault Isolation

Advanced Systems Security: Control-Flow Integrity

A program execution is memory safe so long as memory access errors never occur:

On Compilers, Memory Errors and Control-Flow Integrity

CS261 Scribe Notes: Secure Computation 1

How to Sandbox IIS Automatically without 0 False Positive and Negative

15 Sharing Main Memory Segmentation and Paging

Memory corruption countermeasures

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz I Solutions

Exploiting and Protecting Dynamic Code Generation

Influential OS Research Security. Michael Raitza

Monitor Integrity Protection with Space Efficiency and Separate Compilation

New York University CSCI-UA : Advanced Computer Systems: Spring 2016 Midterm Exam

Spectre and Meltdown. Clifford Wolf q/talk

Buffer Overflow Attacks

Memory Management. Disclaimer: some slides are adopted from book authors slides with permission 1

Low-level software security

Lecture Embedded System Security A. R. Darmstadt, Runtime Attacks

Vx32: Lightweight User-Level Sandboxing on the x86

SoK: Eternal War in Memory

Virtual machines (e.g., VMware)

Advanced Systems Security: Ordinary Operating Systems

CS399 New Beginnings. Jonathan Walpole

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz I Solutions

Outline. Format string attack layout. Null pointer dereference

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 2

Formal Verification Techniques for GPU Kernels Lecture 1

Fast access ===> use map to find object. HW == SW ===> map is in HW or SW or combo. Extend range ===> longer, hierarchical names

16 Sharing Main Memory Segmentation and Paging

CSE 565 Computer Security Fall 2018

Protecting Dynamic Code by Modular Control-Flow Integrity

Software Security: Buffer Overflow Attacks

in memory: an evolution of attacks Mathias Payer Purdue University

Oracle Developer Studio Code Analyzer

Hacking Blind BROP. Presented by: Brooke Stinnett. Article written by: Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazie`res, Dan Boneh

Strato: A Retargetable Framework for Low- Level Inlined Reference Monitors

Selected background on ARM registers, stack layout, and calling convention

Return-orientated Programming

Fast access ===> use map to find object. HW == SW ===> map is in HW or SW or combo. Extend range ===> longer, hierarchical names

Confinement (Running Untrusted Programs)

Security Architecture

The first Secure Programming Laboratory will be today! 3pm-6pm in Forrest Hill labs 1.B31, 1.B32.

2 Sadeghi, Davi TU Darmstadt 2012 Secure, Trusted, and Trustworthy Computing Chapter 6: Runtime Attacks

Secure Systems 2.0: Revisiting and Rethinking the Challenges of Secure System Design. Todd Austin University of Michigan

Outline. V Computer Systems Organization II (Honors) (Introductory Operating Systems) Language-based Protection: Solution

Secure Programming Lecture 6: Memory Corruption IV (Countermeasures)

CFG Construction Soundness in Control-Flow Integrity

Lecture 4 September Required reading materials for this class

Isolation/Confinement

secubt Hacking the Hackers with User Space Virtualization

CSC369 Lecture 2. Larry Zhang

PRESENTED BY: SANTOSH SANGUMANI & SHARAN NARANG

Today. Instance Method Dispatch. Instance Method Dispatch. Instance Method Dispatch 11/29/11. today. last time

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017

Important From Last Time

Virtual Machines and Dynamic Translation: Implementing ISAs in Software

Lecture 08 Control-flow Hijacking Defenses

CSE 127 Computer Security

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall 2011.

Important From Last Time

The Java Language Implementation

Transcription:

Control Flow Integrity & Software Fault Isolation David Brumley Carnegie Mellon University

Our story so far Unauthorized Control Information Tampering http://propercourse.blogspot.com/2010/05/i-believe-in-duct-tape.html 2

Adversary Model Matters! Cowan et al., USENIX Security 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks Programs compiled with StackGuard are safe from buffer overflow attack, regardless of the software engineering quality of the program. What if the adversary is more powerful? How powerful is powerful enough? 3

Reference Monitors 4

Subject People Processes Computer Operations Op request Op response Object Files Sockets Computer Operations 5

Policy Op request Op request Subject Op response Reference Monitor Op response Object Principles: 1. Complete Mediation: The reference monitor must always be invoked 2. Tamper-proof: The reference monitor cannot be changed by unauthorized subjects or objects 3. Verifiable: The reference monitor is small enough to thoroughly understand, test, and ultimately, verify. 6

Inlined Referenced Monitor Policy Op request Subject Reference Monitor Op response Object Today s Example: Inlining a control flow policy into a program 7

Control Flow Integrity Assigned Reading: Control-Flow Integrity: Principles, Implementation and Applications by Abadi, Budiu, Erlingsson, and Ligatti 8

Control Flow Integrity protects against powerful adversary with full control over entire data memory widely-applicable language-neutral; requires binary only provably-correct & trustworthy formal semantics; small verifier efficient hmm 0-45% in experiments; average 16% 9

CFI Adversary Model CAN Overwrite any data memory at any time stack, heap, data segs Overwrite registers in current context CANNOT Execute Data NX takes care of that Modify Code text seg usually read-only Write to %ip true in x86 Overwrite registers in other contexts kernel will restore regs 10

CFI Overview Invariant: Execution must follow a path in a control flow graph (CFG) created ahead of run time. Method: static build CFG statically, e.g., at compile time instrument (rewrite) binary, e.g., at install time add IDs and ID checks; maintain ID uniqueness verify CFI instrumentation at load time direct jump targets, presence of IDs and ID checks, ID uniqueness perform ID checks at run time indirect jumps have matching IDs 11

Control Flow Graphs 12

Basic Block Defn Basic Block: A consecutive sequence of instructions / code such that control is straight the instruction in each position always executes before (dominates) (no jump all those targets in later except positions, at the and beginning, no jumps except at the end) no outside instruction can execute between two instructions in the sequence 1. x = y + z 2. z = t + i 3. x = y + z 4. z = t + i 5. jmp 1 3 static basic blocks 1. x = y + z 2. z = t + i 3. x = y + z 4. z = t + i 5. jmp 1 1 dynamic basic block 6. jmp 3 14

CFG Definition A static Control Flow Graph is a graph where each vertex v i is a basic block, and there is an edge (v i, v j ) if there may be a transfer of control from block v i to block v j. Historically, the scope of a CFG is limited to a function or procedure, i.e., intra-procedural. 15

Call Graph Nodes are functions. There is an edge (v i, v j ) if function v i calls function v j. void orange() { 1. red(1); 2. red(2); 3. green(); } void red(int x) { green();... } void green() { green(); orange(); } orange red green 16

Super Graph Superimpose CFGs of all procedures over the call graph void orange() { 1. red(1); 2. red(2); 3. green(); } void red(int x) {.. } void green() { green(); orange(); } 1 2 3 1: red 2: red A context sensitive super-graph for orange lines 1 and 2. 17

Precision: Sensitive or Insensitive The more precise the analysis, the more accurate it reflects the real program behavior. More precise = more time to compute More precise = more space Limited by soundness/completeness tradeoff Common Terminology in any Static Analysis: Context sensitive vs. context insensitive Flow sensitive vs. flow insensitive Path sensitive vs. path insensitive 18

Soundness Completeness If analysis says X is true, then X is true. If X is true, then analysis says X is true. True Things Things I say Things I say True Things Trivially Sound: Say nothing Trivially complete: Say everything Sound and Complete: Say exactly the set of true things! 19

Context Sensitive Whether different calling contexts are distinguished void yellow() { 1. red(1); 2. red(2); 3. green(); } void red(int x) {.. } Context sensitive distinguishes 2 different calls to red(-) void green() { green(); yellow(); } 21

Context Sensitive Example a = id(4); b = id(5); void id(int z) { return z; } Context-Sensitive (color denotes matching call/ret) Context sensitive can tell one call returns 4, the other 5 a = id(4); b = id(5); void id(int z) { return z; } Context-Insensitive (note merging) Context insensitive will say both calls return {4,5} 22

Flow Sensitive A flow sensitive analysis considers the order (flow) of statements Flow insensitive = usually linear-type algorithm Flow sensitive = usually at least quadratic (dataflow) Examples: Type checking is flow insensitive since a variable has a single type regardless of the order of statements Detecting uninitialized variables requires flow sensitivity x = 4;... x = 5; Flow sensitive can distinguish values of x, flow insensitive cannot 23

Flow Sensitive Example 1. x = 4;... n. x = 5; Flow sensitive: x is the constant 4 at line 1, x is the constant 5 at line n Flow insensitive: x is not a constant 24

Path Sensitive A path sensitive analysis maintains branch conditions along each execution path Requires extreme care to make scalable Subsumes flow sensitivity 25

Path Sensitive Example 1. if(x >= 0) 2. y = x; 3. else 4. y = -x; path sensitive: y >= 0 at line 2, y > 0 at line 4 path insensitive: y is not a constant 26

Precision Even path sensitive analysis approximates behavior due to: loops/recursion unrealizable paths 1. if(a n + b n = c n && n>2 && a>0 && b>0 && c>0) 2. x = 7; 3. else Unrealizable path. 4. x = 8; x will always be 8 27

Control Flow Integrity (Analysis) 28

CFI Overview Invariant: Execution must follow a path in a control flow graph (CFG) created ahead of run time. Method: build CFG statically, e.g., at compile time instrument (rewrite) binary, e.g., at install time add IDs and ID checks; maintain ID uniqueness verify CFI instrumentation at load time direct jump targets, presence of IDs and ID checks, ID uniqueness perform ID checks at run time indirect jumps have matching IDs 29

Build CFG direct calls indirect calls Two possible return sites due to context insensitivity 30

Instrument Binary predicated call 17, R: transfer control to R only when R has label 17 Insert a unique number at each destination predicated ret 23: transfer control to only label 23 Two destinations are equivalent if CFG contains edges to each from the same source 31

Verify CFI Instrumentation Direct jump targets (e.g. call 0x12345678) are all targets valid according to CFG? IDs is there an ID right after every entry point? does any ID appear in the binary by accident? ID Checks is there a check before every control transfer? does each check respect the CFG? easy to implement correctly => trustworthy 32

What about indirect jumps and ret? 33

ID Checks Check dest label Check dest label 34

Performance Size: increase 8% avg Time: increase 0-45%; 16% avg I/O latency helps hide overhead 45% 16% 35

CFI Adversary Model CAN Overwrite any data memory at any time stack, heap, data segs Overwrite registers in current context Assumptions are often vulnerabilities! CANNOT Execute Data NX takes care of that Modify Code text seg usually read-only Write to %ip true in x86 Overwrite registers in other contexts kernel will restore regs 36

Let s check our assumptions! Non-executable Data let s inject code with desired ID Non-writable Code let s overwrite the check instructions can be problematic for JIT compilers Context-Switching Preserves Registers time-of-check vs. time-of-use BONUS point: why don t we use the RET instruction to return? 37

Time-of-Check vs. Time-of-Use what if there is a context switch here? 38

Security Guarantees Effective against attacks based on illegitimate control-flow transfer buffer overflow, ret2libc, pointer subterfuge, etc. Any check becomes non-circumventable. Allow data-only attacks since they respect CFG! incorrect usage (e.g. printf can still dump mem) substitution of data (e.g. replace file names) 39

Software Fault Isolation SFI ensures that a module only accesses memory within its region by adding checks e.g., a plugin can accesses only its own memory if(module_lower < x < module_upper) z = load[x]; SFI Check CFI ensures inserted memory checks are executed 40

Inline Reference Monitors IRMs inline a security policy into binary to ensure security enforcement Any IRM can be supported by CFI + Software Memory Access Control CFI: IRM code cannot be circumvented + SMAC: IRM state cannot be tampered 41

Accuracy vs. Security The accuracy of the CFG will reflect the level of enforcement of the security mechanism. Indistinguishable sites, e.g., due to lack of context sensitivity will be merged 42

Context Sensitivity Problems Suppose A and B both call C. CFI uses same return label in A and B. How to prevent C from returning to B when it was called from A? Shadow Call Stack an protected memory region for call stack each call/ret instrumented to update shadow CFI ensures instrumented checks will be run 43

Proof of Security Theorem (Informal): Given state S 0 with non-writeable, well-instrumented code mem M 0 Then for all runtime steps S i -> S i+1, S i+1 is one of the allowed successors in the CFG, or S i+1 is an error state We can make these sorts of statements precise with operational semantics. 44

CFI Summary Control Flow Integrity ensures that control flow follows a path in CFG Accuracy of CFG determines level of enforcement Can build other security policies on top of CFI 45

Software Fault Isolation Optional Reading: Efficient Software-Based Fault Isolation by Wahbe, Lucco, Anderson, Graham 46

Isolation Mechanisms Hardware Memory Protection (virtual address translation, x86 segmentation) Software Sandboxing Language-Based Hardware + Software Virtual machines Software Fault Isolation Memory Protection in Software 47

SFI Goals Confine faults inside distrusted extensions codec shouldn t compromise media player device driver shouldn t compromise kernel plugin shouldn t compromise web browser Allow for efficient cross-domain calls numerous calls between media player and codec numerous calls between device driver and kernel 48

Main Idea Process Address Space Module 2 Fault Domain 2 segment with id 2, e.g., with top bits 010 Module 1 Fault Domain 1 segment with id 1, e.g., with top bits 011 49

Scheme 1: Segment Matching Check every mem access for matching seg id assume dedicated registers segment register (sr) and data register (dr) not available to the program (no big deal in Alpha) Process Address Space Module 2 Module 1 precondition: sr holds segment id 2 dr = addr scratch = (dr >> 29) compare scratch, sr trap if not equal dst = [dr] 50

Safety Segment matching code must always be run to ensure safety. Dedicated registers must not be writeable by module. 51

Scheme 2: Sandboxing Force top bits to match seg id and continue No comparison is made Process Address Space Module 2 Module 1 precondition: sr holds segment id 2 dr = (addr & mask) dr = (dr sr) dst = [dr] Enforce top bits in dr are sr 52

Segment Matching vs. Sandboxing Segment Matching more instructions Sandboxing fewer instructions can pinpoint exact point of fault where segment id doesn t match just ensures memory access stays in region (crash is ok) 53

Communication between domains RPC 54

Native Client Optional Reading: Native Client: A Sandbox for Portable, Untrusted x86 Native Code by Yee et al. 55

NaCL: A Modern Day Example Browser HTML JavaScript NPAPI or RPC Quake NaCl runtime Two sandboxes: an inner sandbox to mediate x86-specific runtime details (using what technique?) an outer sandbox mediates system calls (Using what technique?) 56

Security Goal Achieve comparable safety to accepted systems such as JavaScript. Input: arbitrary code and data support multi-threading, inter-module communication NaCL checks that code conforms to security rules, else refuses to run. Verified Quake NACL Static Analysis Unverified 57

Obligations What do these obligations guarantee? 58

Guarantees Data integrity: no loads or stores outside of sandbox Think back to SFI paper Reliable disassembly No unsafe instructions Control flow integrity 59

NACL Module At Runtime 4 KB RW protected for NULL ptrs 60 KB for trampoline/springboard Transfer from trusted to untrusted code, and vice-versa Untrusted Code 60

Performance - Quake 61

Questions? 62

END

TOC/TOU Time of Check/Time of Use bugs are a type of race condition time $ open( myfile ); monitor does complex check monitor OK s OS carries out action $ ln s myfile /etc/passwd monitor OK s Action performed 64

Software Mandatory Access Control Fine-grained SFI: SMAC can have different access checks at different instructions. isolated code region => no need for NX data 65

Context Sensitivity Problems Suppose A calls C and B calls C, D. CFI uses same call label for C and D due to B. How to prevent A from calling D? duplicate C into C A and C B, or use more complicated labeling mechanism 66

Guard Zones unmapped pages around segment to avoid checking offsets Lazier SP Check check SP only before jumps Optimizations 67

Performance store and jump checked load, store and jump checked 68

Is it counter-intuitive? Slow down common case of intra-domain control transfer in order to speed up interdomain transfer Check every load, store, jump within a domain Faster in practice than hardware when interdomain calls are frequent Context switches are expensive Each cross-module call requires a context switch 69

Differences between NaCL SFI and Wahbe SFI NaCL uses segments for data to ensure loads/stores are within a module Do not need sandboxing overhead for these instructions Others? After reading Wahbe et al, how would you implement inter-module communication efficiently? 70

Performance Micro Benchmarks 71