Research on Automated Defenses for Common Exploits
Software exploit defenses have long remained as one of the most important research areas in the lab. Given the large base of existing software, and large gaps in automated or manual code analyses for discovering them, automated exploit defenses remain as perhaps one bright area, as these techniques are often able to block vast classes of popular exploits at little (or relatively low) cost.
Our research initially targeted the popular memory error exploits [30, 29, 25, 23, 22]. Many of these defenses rely on randomization, and are hence subject to brute-force attacks that try to guess the randomization key. To defend against these attacks, we developed novel techniques that rely on a forensic analysis of the memory space of randomized applications and/or application behavior models to synthesize accurate attack signatures [28, 27]. These signatures are developed within milliseconds after the first unsuccessful attack, and can hence defeat brute-force attacks.
We subsequently extended automated exploit defense to a much larger class of vulnerabilities, including those that lead to SQL injection, command injection, cross-site scripting, path-traversal, format-string vulnerabilities, and so on [26, 21]. Automated exploit defense continue to be one of the most active areas of research within the lab.
Related Publications
- [1] Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata
ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS) February, 2024.
, and - [2] SAFER: Efficient and Error-Tolerant Binary Instrumentation
USENIX Security Symposium (USENIX Security) August, 2023.
, , and - [3] Extracting Instruction Semantics Via Symbolic Execution of Code Generators
ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE) November, 2016.
and - [4] Lifting Assembly to Intermediate Representation: A Novel Approach Leveraging Compilers
ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS) April, 2016.
and - [5] Code and Control Flow Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks
Annual Computer Security Applications Conference (ACSAC) December, 2015.
and - [6] A Principled Approach for ROP Defense
Annual Computer Security Applications Conference (ACSAC) December, 2015.
, and - [7] Harbormaster: Policy Enforcement for Containers
IEEE CloudCom (CloudCom) November, 2015.
, and - [8] Automatic Generation of Assembly to IR Translators Using Compilers
Workshop on Architectural and Microarchitectural Support for Binary Translation (AMAS-BT) February, 2015.
and - [9] Eternal War in Memory
IEEE Security and Privacy Magazine (S&P Magazine) May, 2014.
, , and - [10] A Platform for Secure Static Binary Instrumentation
Virtual Execution Environments (VEE) March, 2014.
, , and - [11] Control Flow Integrity for COTS Binaries
USENIX Security Symposium (USENIX Security) August, 2013.Best paper award! .
and - [12] SoK: Eternal War in Memory
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2013.
, , and - [13] Protecting Function Pointers in Binary
ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2013.
, , , , and - [14] Practical Control Flow Integrity and Randomization for Binary Executables
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2013.
, , , , , , and - [15] Protection, Usability and Improvements in Reflected XSS Filters
ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2012.
and - [16] Taint-Enhanced Anomaly Detection
International Conference on Information Systems Security (ICISS) December, 2011.
and - [17] A Server- and Browser-Transparent CSRF Defense for Web 2.0 Applications
Annual Computer Security Applications Conference (ACSAC) December, 2011.
and - [18] PAriCheck: An Efficient Pointer Arithmetic Checker for C Programs
ACM Symposium on Information, Computer and Communications Security (ASIACCS) March, 2010.
, , , , and - [19] Online Signature Generation for Windows Systems
Annual Computer Security Applications Conference (ACSAC) December, 2009.
, and - [20] Practical Techniques for Regeneration and Immunization of COTS Applications
Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS) June, 2009.
, , , and - [21] An Efficient Black-box Technique for Defeating Web Application Attacks
ISOC Network and Distributed Systems Symposium (NDSS) February, 2009.- [22] Anomalous Taint Detection (Extended Abstract)
Recent Advances in Intrusion Detection (RAID) September, 2008. (Full version available as Technical Report SECLAB08-06).
and - [23] Data Space Randomization
Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
and - [24] Comprehensive Memory Error Protection via Diversity and Taint-Tracking
PhD Dissertation (Stony Brook University) February, 2008.- [25] Address-Space Randomization for Windows Systems
Annual Computer Security Applications Conference (ACSAC) December, 2006.
, and - [26] Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
USENIX Security Symposium (USENIX Security) August, 2006. (An earlier version appeared as Technical Report SECLAB-05-06, November 2005. Also supercedes Technical Report SECLAB-05-05 A Unified Approach for Preventing Attacks Exploiting a Range of Software Vulnerabilities, August 2005, and Technical Report SECLAB-05-04 Practical dynamic taint analysis for countering input validation attacks on web applications, May 2005, [PDF]).
, and - [27] Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models
Annual Computer Security Applications Conference (ACSAC) December, 2005. (Supercedes Technical Report SECLAB-05-01 An Immune System Inspired Approach for Protection from Repetitive Attacks, March 2005.).
and - [28] Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers
ACM Conference on Computer and Communications Security (CCS) November, 2005. (Supercedes Technical Report SECLAB-05-02 Automated, Sub-second Attack Signature Generation: A Basis for Building Self-Protecting Servers, May 2005.).
and - [29] Efficient Techniques for Comprehensive Protection from Memory Error Exploits
USENIX Security Symposium (USENIX Security) August, 2005.
, and - [30] Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
USENIX Security Symposium (USENIX Security) August, 2003.
, and