• Title/Summary/Keyword: control flow integrity

Search Result 62, Processing Time 0.034 seconds

Precise control flow protection based on source code (소스코드 기반의 정밀도 높은 실행 흐름 보호 기법)

  • Lee, JongHyup;Kim, Yong Seung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1159-1168
    • /
    • 2012
  • Control Flow Integrity(CFI) and Control Flow Locking(CFL) prevent unintended execution of software and provide integrity in control flow. Attackers, however, can still hijack program controls since CFI and CFL does not support fine-granularity, context-sensitive protection. In this paper, we propose a new CFI scheme, Source-code CFI(SCFI), to overcome the problems. SCFI provides context-sensitive locking for control flow. Thus, the proposed approach protects software against the attacks on the previous CFI and CFL schemes and improves safety.

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

The Analysis of Flow Circulation System for HANARO Flow Simulated Test Facility (하나로 유동모의 설비의 유체순환계통 해석)

  • Park, Yong-Chul
    • 유체기계공업학회:학술대회논문집
    • /
    • 2002.12a
    • /
    • pp.419-424
    • /
    • 2002
  • The HANARO, a multi-purpose research reactor of 30 MWth open-tank-in-pool type, has been under normal operation since its initial criticality In February, 1995. Many experiments should be safely performed to activate the utilization of the HANARO. A flow simulation facility is being developed for the endurance test of reactivity control units for extended life times and the verification of structural integrity of those experimental facilities prior to loading in the HANARO. This test facility is composed of three major parts; a half-core structure assembly, flow circulation system and support system. The flow circulation system is composed of a circulation pump, a core flow pipe, a core bypass flow pipe and instruments. The system is to be filled with de-mineralized water and the flow should be met the design flow to simulate similar flow characteristics in the core channel of the half-core test facility to the HANARO. This paper, therefore, describes an analytical analysis to study the flow behavior of the system. The computational flow analysis has been performed for the verification of system pressure variation through the three-dimensional analysis program with standard k-$\epsilon$ turbulence model and for the verification of the structural piping integrity through the finite element method. The results of the analysis are satisfied the design requirements and structural piping integrity of flow circulation system.

  • PDF

The Analysis for Flow Circulation System in HANARO Flow Simulation Facility (하나로 유동 모의 설비의 유체순환계통 해석)

  • Park, Yong-Chul
    • The KSFM Journal of Fluid Machinery
    • /
    • v.7 no.1 s.22
    • /
    • pp.30-35
    • /
    • 2004
  • The HANARO, a multi-purpose research reactor of 30 MWth open-tank-in-pool type, has been under normal operation since its initial criticality in February, 1995. Many experiments should be safely performed to activate the utilization of the HANARO. HANARO flow simulation facility is being developed for the endurance test of reactivity control units for extended life time and the verification of structural integrity of those experimental equipments prior to loading in the HANARO. This facility is composed of three major parts; a half-core structure assembly, a flow circulation system and a support system. The flow circulation system is composed of a circulation pump, a core flow piping, a core bypass flow piping and instruments. The system is to be filled with de-mineralized water and the flow should be met the design requirements to simulate a similar flow characteristics in the core channel of the half-core structure assembly to the HANARO. This paper, therefore, presents an analytical analysis to study the flow behavior of the system. Computational flow analysis has been performed for the verification of system pressure variation through the three-dimensional analysis program with the standard $k-{\epsilon}$ turbulence model and for the verification of the structural piping integrity through the finite element method. According to the analysis results, it could be said that the design requirements and the structural piping integrity of the flow circulation system are satisfied.

A Study of Attacks to Bypass CFI on Android Application Environment (안드로이드 애플리케이션 환경에서 CFI 우회 공격기법 연구)

  • Lee, Ju-yeop;Choi, Hyoung-kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.881-893
    • /
    • 2020
  • CFI(Control Flow Integrity) is a mitigation mechanism that protects programs by verifying control flows. IFCC(Indirect Function Call Checks) and SCS(Shadow Call Stack), CFI supported by LLVM Clang compiler, were introduced to protect applications in Android. IFCC protects function calls and SCS protects function returns. In this paper, we propose attacks to bypass CFI on the application environment with IFCC and SCS. Even if IFCC and SCS were applied to user applications, it was confirmed that there were many code segments not protected by IFCC and SCS in the application memory. We execute code in CFI unprotected segments to construct 1) bypassing IFCC to call a protected function, 2) modulating return address via SCS bypass. We identify code segments not protected by IFCC and SCS in Android10 QP1A. 191005.007.A3. We also implement proof-of-concept exploits to demonstrate that modulation of control flow is possible in an environment where IFCC and SCS are applied.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Design of Integrated Role-Based Access Control Model (통합 직무기반 접근제어 모델 설계)

  • 박진호;안성진
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.1-7
    • /
    • 2001
  • This paper design a role-based access control model that can resolves the complicated problems of access control requirements. In this paper, we designed an access control model which can control a permission making use up role-based access control, can guard the confidentiality, integrity and availability of information and can control illegal information flow. The designed access control model can protect resources from unauthorized accesses based on the role, multi-level security policies of security level, integrity level and ownership.

  • PDF

A Design of Role-Based Access Control Model (직무기반 접근제어 모델 설계)

  • Lee, Ho;Chung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.60-66
    • /
    • 2001
  • We designed a role-based access control model that can resolve the complicated tasks of control requirements. The designed access control model can control permissions efficiently use of a role-based access control. It guarantees the confidentiality integrity and availa information making use of identity-based and rule-based access controls. It can also centre information flow. Our access control model protects resources from unauthorized accesses b multi-level security policies such as role, security level, integrity level and ownership.

  • PDF

Direct and Indirect Membrane Integrity Tests for Monitoring Microbial Removal by Microfiltration (정밀여과(MF)막 미생물 제거율 모니터링을 위한 막 완전성시험)

  • Hong, Seungkwan;Miller, Frank;Taylor, James
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.18 no.6
    • /
    • pp.801-806
    • /
    • 2004
  • The pilot study was conducted to (i) investigate the ability of various membrane integrity monitoring methods to detect changes in membrane integrity during operation, and (ii) determine the impact of membrane damage on microbial removal by microfiltration. Two variations of air pressure hold tests were investigated for direct integrity monitoring: pressure decay (PD) and diffusive air flow (DAF) tests which are most commonly used integrity tests for microfiltration (MF) membranes. Both PD and DAF tests were sensitive enough to detect one damaged fiber out of 66,000 under field operaing conditions. Indirect integrity monitoring such as turbidity and particle counting, however, responded poorly to defects in membrane systems. Microbial challenge study was performed using both new and deliberately damaged membranes, as well as varying the state of fouling of the membrane. This study demonstrated that MF membrane with nominal pore size $0.2{\mu}m$ was capable of removing various pathogens including coliform, spore, and cryptosporidium, at the level required by drinking water regulations, even when high operating pressures were applied. A sharp decrease in average log reduction value (LRV) was observed when one fiber was damaged, emphasizing the importance of membrane integrity in control of microbial contamination.

Integrity Evaluation of Control Rod Assembly for Sodium-Cooled Fast Reactor due to Drop Impact (낙하충격에 의한 소듐냉각고속로 제어봉집합체의 건전성 평가)

  • Lee, Hyun Seung;Yoon, Kyung Ho;Kim, Hyung Kyu;Cheon, Jin Sik;Lee, Chan Bock
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.3
    • /
    • pp.233-239
    • /
    • 2017
  • The CA (Control Assembly) of an SFR has a CRA(Control Rod Assembly) with an inner duct and control rod. During an emergency situation, the CRA falls into the duct of the CA for a rapid shut-down. The drop time and impact velocity of the CRA are important parameters with respect to the reactivity insertion time and the structural integrity of the CRA. The objective of this study was to investigate the dynamic behavior and integrity of the CRA owing to a drop impact. The impact analysis of the CRA under normal/abnormal drop conditions was carried out using the commercial FEM code LS-DYNA. Results of the drop impact analysis demonstrated that the CRA maintained structural integrity, and could be safely inserted into the flow hole of the damper under abnormal conditions.