TY - JOUR
T1 - Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches
AU - Cheng, Long
AU - Ahmed, Salman
AU - Liljestrand, Hans
AU - Nyman, Thomas
AU - Cai, Haipeng
AU - Jaeger, Trent
AU - Asokan, N.
AU - Yao, Danfeng Daphne
N1 - Publisher Copyright:
© 2021 ACM.
PY - 2021/11
Y1 - 2021/11
N2 - Data-oriented attacks manipulate non-control data to alter a program's benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechanisms. However, these threats have not been adequately addressed. In this survey article, we first map data-oriented exploits, including Data-Oriented Programming (DOP) and Block-Oriented Programming (BOP) attacks, to their assumptions/requirements and attack capabilities. Then, we compare known defenses against these attacks, in terms of approach, detection capabilities, overhead, and compatibility. It is generally believed that control flows may not be useful for data-oriented security. However, data-oriented attacks (especially DOP attacks) may generate side effects on control-flow behaviors in multiple dimensions (i.e., incompatible branch behaviors and frequency anomalies). We also characterize control-flow anomalies caused by data-oriented attacks. In the end, we discuss challenges for building deployable data-oriented defenses and open research questions.
AB - Data-oriented attacks manipulate non-control data to alter a program's benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechanisms. However, these threats have not been adequately addressed. In this survey article, we first map data-oriented exploits, including Data-Oriented Programming (DOP) and Block-Oriented Programming (BOP) attacks, to their assumptions/requirements and attack capabilities. Then, we compare known defenses against these attacks, in terms of approach, detection capabilities, overhead, and compatibility. It is generally believed that control flows may not be useful for data-oriented security. However, data-oriented attacks (especially DOP attacks) may generate side effects on control-flow behaviors in multiple dimensions (i.e., incompatible branch behaviors and frequency anomalies). We also characterize control-flow anomalies caused by data-oriented attacks. In the end, we discuss challenges for building deployable data-oriented defenses and open research questions.
UR - http://www.scopus.com/inward/record.url?scp=85116462429&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85116462429&partnerID=8YFLogxK
U2 - 10.1145/3462699
DO - 10.1145/3462699
M3 - Article
AN - SCOPUS:85116462429
SN - 2471-2566
VL - 24
JO - ACM Transactions on Privacy and Security
JF - ACM Transactions on Privacy and Security
IS - 4
M1 - 26
ER -