Non-control data attack detection method and device based on novel program dependence graph

A program dependency graph and attack detection technology, applied in the fields of electrical digital data processing, computer security devices, instruments, etc., can solve problems such as inability to effectively detect attacks and difficult deployment of applications

Active Publication Date: 2020-01-21
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since non-control data will not violate the integrity of control flow, and the existing control flow attack detection methods cannot effectively detect this type of attack, although DFI (Date Flow Integrity) can defend against non-control data attacks, it introduces Up to 103% performance overhead, making it difficult to deploy applications in real environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-control data attack detection method and device based on novel program dependence graph
  • Non-control data attack detection method and device based on novel program dependence graph
  • Non-control data attack detection method and device based on novel program dependence graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0045] The existing non-control data attack detection technology (DFI) realizes the defense against non-control data attacks by verifying whether the operation on variables conforms to the data flow graph (Data Flow Graph, DFG). However, DFI needs to perform reachability analysis on each operation of variables. Because reachability analysis may be redundant and complicated for some read operations, it will cause DFI false positives and protect the data flow integrity of all variables. It also introduces a lot of overhead, making it difficult to deploy applications in real environments. Embodiment of the present invention, see figure 1 As shown, a non-control data attack detection method based on a new program depende...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security space, and particularly relates to a non-control data attack detection method and device based on a novel program dependency graph, andthe method comprises the steps: constructing a security-sensitive non-control data set in a program and the novel program dependency graph of basic block granularity through static analysis, and carrying out instrumentation of the LLVM intermediate language representation of the program; in the running process, access and calling operation of the safety-sensitive non-control data in the program is verified, and therefore the data flow integrity of the safety-sensitive non-control data is protected. The control flow and the data flow of the program are combined, and data flow integrity protection of safe and sensitive non-control data in the target program is realized according to the novel program dependency graph during running. The protected non-control data is shrunk to a safe and sensitive non-control data set, analysis and instrumentation processing are carried out on the granularity of the basic block, the running efficiency of a program is guaranteed, safety and performance expenditure are balanced, good universality is achieved, and a new solution is provided for non-control data attack detection.

Description

technical field [0001] The invention belongs to the technical field of network security space, and in particular relates to a non-control data attack detection method and device based on a novel program dependency graph, which can be used to detect non-control data attack behavior existing in a target program. Background technique [0002] Cyberspace is a network that connects various information technology infrastructures, including the Internet, various computer systems, and a virtual environment where people interact with each other. The network is not only a carrier and medium of information, it also improves people's thinking. To some extent, people's environment is endowed with the attributes of network and information. Therefore, it can be considered that the core of cyberspace security is information security. Today, information technology and its industrial applications are ushering in unprecedented prosperity, and cyberspace security issues are becoming more and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 李清宝王烨曹飞杨治国张平陈志峰张贵民
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products