Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data

نویسندگان

چکیده

An increasing number of embedded systems include dedicated neural hardware. To benefit from this specialized hardware, deep learning techniques to discover malware on are needed. This effort evaluated candidate machine detection for distinguishing exploited non-exploited RISC-V program behavior using execution traces. We first developed a dataset traces containing Return Oriented Programming (ROP) exploitation the Instruction Set Architecture (ISA) and then several bidirectional Long Short-Term Memory (LSTM) models capable traces, each subsets features objective was evaluate which (instruction addresses immediate values) an trace application-specific, (opcodes operands) application-agnostic, how these affect model performance. Application-agnostic allow generalize its capability detecting ROP in previously unseen applications. The opcode operand sequences obtained 98.21% cross validation accuracy 97.94% test accuracy. In contrast, address values 92.79% with 99.59% set research also analyzed whether ROPs significantly affects branch prediction; experimental evidence suggests that it does. Thus, prediction could be valuable feature exploits.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Mitigations for Return-Oriented Programming Attacks

With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system’s secur...

متن کامل

The RISC - V Compressed Instruction Set Manual

Warning! This draft specification may change before being accepted as standard, so implementations made to this draft specification might not conform to the future standard.

متن کامل

Return Oriented Programming - Exploit Implementation using functions

Return Oriented programming was surfaced first a decade ago, and was built to overcome the buffer exploit defense mechanisms like ASLR, DEP (or W^ X) by method of reusing the system code in the form of gadgets which are stitched together to make a Turing complete attack. And to perform Turing complete attack would require greater efforts which are quite complex, and there is very little researc...

متن کامل

Defending against Return-Oriented Programming

Defending against Return-Oriented Programming

متن کامل

Escape From Return-Oriented Programming: Return-oriented Programming without Returns (on the x86)

We show that on the x86 it is possible to mount a return-oriented programming attack without using any return instructions. Our new attack instead makes use of certain instruction sequences that behave like a return; we show that these sequences occur with sufficient frequency in large Linux libraries to allow creation of a Turing-complete gadget set. Because it does not make use of return inst...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3170479