NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack

Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and hardware defenses because they use the software’s own code and they are very hard to be detected without significant overhead. Numerous methods have been proposed to protect against memory-based attacks that re...

Full description

Bibliographic Details
Main Authors: Ayman M. El-Zoghby, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10107607/
_version_ 1827942783020695552
author Ayman M. El-Zoghby
Mahmoud Said Elsayed
Anca D. Jurcut
Marianne A. Azer
author_facet Ayman M. El-Zoghby
Mahmoud Said Elsayed
Anca D. Jurcut
Marianne A. Azer
author_sort Ayman M. El-Zoghby
collection DOAJ
description Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and hardware defenses because they use the software’s own code and they are very hard to be detected without significant overhead. Numerous methods have been proposed to protect against memory-based attacks that result from reusing parts of the attacked binary code. In this paper, two problems were tackled. the first problem is the lack of a categorized survey, analysis, and evaluation of the different CRAs proposed in the literature. The second problem is the inherent vulnerability that exists in protection techniques that are based on Multi-Variant Execution Environment (MVEE) since they are using shared Linux libraries with gadget-prone codes. In the paper a novel framework of CRA mitigation is introduced; fusing the two different prominent techniques of control flow integrity and multi-variant execution environment. The novel mitigation technique, named Next Generation MVEE (NG-MVEE), was built upon an existing generic CRA detection system (GHUMVEE) and complemented with a different CRA detection technique (G-Free) in order to provide comprehensive protection against code-reuse attacks. The outcome of the hybrid system is an optimized hybrid version of an MVEE technique, with minimal performance overhead increase due to the added protection layer of the G-Free technique. A median of 7% performance overhead resulted from the proposed protection system.
first_indexed 2024-03-13T10:04:31Z
format Article
id doaj.art-988a5f67d3ef4cdca16c16c2cb5d3810
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-13T10:04:31Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-988a5f67d3ef4cdca16c16c2cb5d38102023-05-22T23:00:33ZengIEEEIEEE Access2169-35362023-01-0111481694819110.1109/ACCESS.2023.326988110107607NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use AttackAyman M. El-Zoghby0https://orcid.org/0009-0001-3517-8226Mahmoud Said Elsayed1https://orcid.org/0000-0003-2416-7481Anca D. Jurcut2https://orcid.org/0000-0002-2705-1823Marianne A. Azer3https://orcid.org/0000-0002-8068-5120School of Information Technology and Computer Science, Nile University, Cairo, EgyptSchool of Computer Science, University College Dublin, Dublin 4, IrelandSchool of Computer Science, University College Dublin, Dublin 4, IrelandSchool of Information Technology and Computer Science, Nile University, Cairo, EgyptCode-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and hardware defenses because they use the software’s own code and they are very hard to be detected without significant overhead. Numerous methods have been proposed to protect against memory-based attacks that result from reusing parts of the attacked binary code. In this paper, two problems were tackled. the first problem is the lack of a categorized survey, analysis, and evaluation of the different CRAs proposed in the literature. The second problem is the inherent vulnerability that exists in protection techniques that are based on Multi-Variant Execution Environment (MVEE) since they are using shared Linux libraries with gadget-prone codes. In the paper a novel framework of CRA mitigation is introduced; fusing the two different prominent techniques of control flow integrity and multi-variant execution environment. The novel mitigation technique, named Next Generation MVEE (NG-MVEE), was built upon an existing generic CRA detection system (GHUMVEE) and complemented with a different CRA detection technique (G-Free) in order to provide comprehensive protection against code-reuse attacks. The outcome of the hybrid system is an optimized hybrid version of an MVEE technique, with minimal performance overhead increase due to the added protection layer of the G-Free technique. A median of 7% performance overhead resulted from the proposed protection system.https://ieeexplore.ieee.org/document/10107607/Code-reuse attacksexploit mitigationGHUMVEEG-Freehybrid-systemsoftware security
spellingShingle Ayman M. El-Zoghby
Mahmoud Said Elsayed
Anca D. Jurcut
Marianne A. Azer
NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack
IEEE Access
Code-reuse attacks
exploit mitigation
GHUMVEE
G-Free
hybrid-system
software security
title NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack
title_full NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack
title_fullStr NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack
title_full_unstemmed NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack
title_short NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack
title_sort ng mvee a new proposed hybrid technique for enhanced mitigation of code re use attack
topic Code-reuse attacks
exploit mitigation
GHUMVEE
G-Free
hybrid-system
software security
url https://ieeexplore.ieee.org/document/10107607/
work_keys_str_mv AT aymanmelzoghby ngmveeanewproposedhybridtechniqueforenhancedmitigationofcodereuseattack
AT mahmoudsaidelsayed ngmveeanewproposedhybridtechniqueforenhancedmitigationofcodereuseattack
AT ancadjurcut ngmveeanewproposedhybridtechniqueforenhancedmitigationofcodereuseattack
AT marianneaazer ngmveeanewproposedhybridtechniqueforenhancedmitigationofcodereuseattack