Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
CPM: masking code pointers to prevent code injection attacks
Philippaerts P., Younan Y., Muylle S., Piessens F., Lachmund S., Walter T. ACM Transactions on Information and System Security16 (1):1-27,2013.Type:Article
Date Reviewed: Sep 19 2013

One way for an attacker to take control of a computer is to replace the value of a code pointer or return address with the address of the attacker’s program. Code pointer masking (CPM) guards against this kind of attack by ANDing a bit pattern with such an address and then jumping to the resulting address rather than to the original address. The execution time cost of the countermeasure is low and it is hard for the attacker to circumvent.

This paper explains the concepts behind such code injection attacks and surveys other countermeasures. It then gives a careful description of CPM, explaining how the bit pattern is constructed and used in a wide range of situations involving transfer to an address stored in memory. The authors developed implementations for the ARM and x86 architectures, and evaluated them against standard benchmarks. The paper analyzes both the timing and security of the method in light of these implementations.

I found the paper to be readable and informative, and accessible to anyone with a rudimentary understanding of machine architecture and assembly language programming. Although the issue addressed is security related, no knowledge of the security field is needed.

Reviewer:  W. M. Waite Review #: CR141575 (1312-1112)
Bookmark and Share
 
Security and Protection (D.4.6 )
 
 
Privacy (K.4.1 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy