Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches

Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng Daphne Yao

Research output: Contribution to journalArticleScientificpeer-review

Abstract

Data-oriented attacks manipulate non-control data to alter a program's benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechanisms. However, these threats have not been adequately addressed. In this survey article, we first map data-oriented exploits, including Data-Oriented Programming (DOP) and Block-Oriented Programming (BOP) attacks, to their assumptions/requirements and attack capabilities. Then, we compare known defenses against these attacks, in terms of approach, detection capabilities, overhead, and compatibility. It is generally believed that control flows may not be useful for data-oriented security. However, data-oriented attacks (especially DOP attacks) may generate side effects on control-flow behaviors in multiple dimensions (i.e., incompatible branch behaviors and frequency anomalies). We also characterize control-flow anomalies caused by data-oriented attacks. In the end, we discuss challenges for building deployable data-oriented defenses and open research questions.

Original languageEnglish
Article number26
Number of pages36
JournalACM Transactions on Privacy and Security
Volume24
Issue number4
DOIs
Publication statusPublished - Nov 2021
MoE publication typeA1 Journal article-refereed

Keywords

  • BOP
  • branch correlation
  • Data-oriented attacks
  • DOP
  • frequency anomaly

Fingerprint

Dive into the research topics of 'Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches'. Together they form a unique fingerprint.

Cite this