PtrProxy: Efficient code re-randomization on AArch64 platform

Memory-unsafe programming languages, such as C/C++, are often used to develop system programs, rendering the programs susceptible to a variety of memory corruption attacks. Among these threats, just-in-time return-oriented programming (JIT-ROP) stands out as an advanced method for conducting code-re...

Full description

Saved in:
Bibliographic Details
Published inChina communications Vol. 22; no. 6; pp. 64 - 82
Main Authors Chenke, Luo, Jianming, Fu, Jiang, Ming, Mengfei, Xie, Guojun, Peng
Format Journal Article
LanguageEnglish
Published China Institute of Communications 01.06.2025
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Memory-unsafe programming languages, such as C/C++, are often used to develop system programs, rendering the programs susceptible to a variety of memory corruption attacks. Among these threats, just-in-time return-oriented programming (JIT-ROP) stands out as an advanced method for conducting code-reuse attacks, effectively circumventing code randomization safeguards. JIT-ROP leverages memory disclosure vulnerabilities to obtain reusable code fragments dynamically and assemble malicious payloads dynamically. In response to JIT-ROP attacks, several re-randomization implementations have been developed to prevent the use of disclosed code. However, existing re-randomization methods require recurrent re-randomization during program runtime according to fixed time windows or specific events such as system calls, incurring significant runtime overhead. In this paper, we present the design and implementation of PtrProxy, an efficient re-randomization approach on the AArch64 platform. Unlike previous methods that necessitate frequent runtime rerandomization or reply on unreliable triggering conditions, this approach triggers the re-randomization process by detecting the code page harvest operation, which is a fundamental operation of the JIT-ROP attacks, making our method more efficient and reliable than previous approaches. We evaluate PtrProxy on benchmarks and real-world applications. The evaluation results show that our approach can effectively protect programs from JIT-ROP attacks while introducing marginal runtime overhead.
AbstractList Memory-unsafe programming languages, such as C/C++, are often used to develop system programs, rendering the programs susceptible to a variety of memory corruption attacks. Among these threats, just-in-time return-oriented programming (JIT-ROP) stands out as an advanced method for conducting code-reuse attacks, effectively circumventing code randomization safeguards. JIT-ROP leverages memory disclosure vulnerabilities to obtain reusable code fragments dynamically and assemble malicious payloads dynamically. In response to JIT-ROP attacks, several re-randomization implementations have been developed to prevent the use of disclosed code. However, existing re-randomization methods require recurrent re-randomization during program runtime according to fixed time windows or specific events such as system calls, incurring significant runtime overhead. In this paper, we present the design and implementation of PtrProxy, an efficient re-randomization approach on the AArch64 platform. Unlike previous methods that necessitate frequent runtime rerandomization or reply on unreliable triggering conditions, this approach triggers the re-randomization process by detecting the code page harvest operation, which is a fundamental operation of the JIT-ROP attacks, making our method more efficient and reliable than previous approaches. We evaluate PtrProxy on benchmarks and real-world applications. The evaluation results show that our approach can effectively protect programs from JIT-ROP attacks while introducing marginal runtime overhead.
Author Mengfei, Xie
Guojun, Peng
Jianming, Fu
Chenke, Luo
Jiang, Ming
Author_xml – sequence: 1
  givenname: Luo
  surname: Chenke
  fullname: Chenke, Luo
  organization: Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
– sequence: 2
  givenname: Fu
  surname: Jianming
  fullname: Jianming, Fu
  organization: Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
– sequence: 3
  givenname: Ming
  surname: Jiang
  fullname: Jiang, Ming
  organization: Department of Computer Science, Tulane University, New Orleans, LA 70118 USA
– sequence: 4
  givenname: Xie
  surname: Mengfei
  fullname: Mengfei, Xie
  organization: Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
– sequence: 5
  givenname: Peng
  surname: Guojun
  fullname: Guojun, Peng
  organization: Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
BookMark eNpFj89KxDAYxHNYwXXdBxA89AVa8yVpkgoeSln_seAe9By-pgm2bJsl7cH16e26gsPAXGYGfldkMYTBEXIDNGO8gOLutaqyDjNGmUgpVWpBliAVT3Mh1CVZj2NHZ2kpuWRL8rCb4i6Gr-N9svG-ta0bpsSGxiXRpRGHJvTtN05tGJLZZRntpxTJYY-TD7G_Jhce96Nb_-WKfDxu3qvndPv29FKV29SC0FNaSyxq7hmndeMBbI5cW8TcaakRkVkogDnfcA-1r5USjfas1oVC0LnXwFcEzr82hnGMzptDbHuMRwPU_GKbGdt0aE7Y5oQ9b27Pm9Y5998HKnItKf8Ba3JYbA
CODEN CCHOBE
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.23919/JCC.ja.2024-0077
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Economics
EndPage 82
ExternalDocumentID 10_23919_JCC_ja_2024_0077
11045860
Genre orig-research
GroupedDBID -SI
-SJ
-S~
0R~
29B
4.4
5GY
6IK
92H
92I
97E
AAHTB
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABPEJ
ABQJQ
ABVLG
AENEX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CAJEI
CAJEJ
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
Q--
Q-9
RIA
RIE
RNS
TCJ
TGT
U1G
U5S
U5T
AAYXX
CITATION
RIG
ID FETCH-LOGICAL-c148t-b6a9b3f230bdf11c5a38caa5e868aaa2c1912efd3f1bfb774d8f2b897a185f813
IEDL.DBID RIE
ISSN 1673-5447
IngestDate Thu Jul 03 08:41:26 EDT 2025
Wed Aug 27 01:38:16 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c148t-b6a9b3f230bdf11c5a38caa5e868aaa2c1912efd3f1bfb774d8f2b897a185f813
PageCount 19
ParticipantIDs crossref_primary_10_23919_JCC_ja_2024_0077
ieee_primary_11045860
PublicationCentury 2000
PublicationDate 2025-June
PublicationDateYYYYMMDD 2025-06-01
PublicationDate_xml – month: 06
  year: 2025
  text: 2025-June
PublicationDecade 2020
PublicationTitle China communications
PublicationTitleAbbrev ChinaComm
PublicationYear 2025
Publisher China Institute of Communications
Publisher_xml – name: China Institute of Communications
SSID ssj0000866362
Score 2.32656
Snippet Memory-unsafe programming languages, such as C/C++, are often used to develop system programs, rendering the programs susceptible to a variety of memory...
SourceID crossref
ieee
SourceType Index Database
Publisher
StartPage 64
SubjectTerms code reuse attacks
Codes
Computer crashes
Layout
Payloads
Protection
Prototypes
re-randomization
Rendering (computer graphics)
return-oriented programming
Runtime
Security
security and privacy
Software
software security
Title PtrProxy: Efficient code re-randomization on AArch64 platform
URI https://ieeexplore.ieee.org/document/11045860
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LS8MwGA-6i158TpwvevAkpGvzaip4kLExBo4dHOxWkjQ5TNnG7C7-9X5JO18gCKWUEtrwfWm_V36_D6FbbrhJnCfD49JiprnAoOYEw68vsRnNLBce7_w0FsMpG834rAGrByyMtTZsPrOxvwy1_HJpNj5V1gVTxbgUEKHvQuRWg7U-EyrgmwsaGoimIvMFf5bVVUxC8zTvjnq9eO6JhgjDnsPmhx361lgl2JXBIRpvZ1RvJ3mJN5WOzfsvssZ_T_kIHTQeZvRYL4ljtGMXJ2hvC0B-O0UPk2o98a-7j_qBQAKeEHloe7S2GExXCeNqcGYEx6PnphUsWr2qyju4bTQd9J97Q9x0UcAGQp0Ka6FyTR2EGrp0aWq4otIoxa0UUilFDERsxLqSulQ7Dd5gKR3RMs8UmHInU3qGWovlwp6jyClpc2OshhPLaSKZMUQrDV-9YYyYDrrbyrRY1WQZBQQZQQEFKKCYq8IroPAK6KC2F9fXwEZSF3_cv0T7xPfeDRmQK9Sq1ht7DQ5BpW_CQvgAlPWxxA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1bS8MwFD54eZgvXife7YO-CJ1tmqSp4INMZW4qe9hgbzVJk4cpU2aH6H_xr_jbPGk3b-CjIJRSSihpvpDzneSc7wDsMc10YJ0YHhPGp4pxH2EOfFz6AhNHsWHc5TtfXfNGlzZ7rDcFrx-5MMaYIvjM1NxjcZaf3euR2yo7RFNFmeDBOIayZZ6f0EN7PL44RTj3CTk_69Qb_riIgK-R6ee-4jJRkUWmrTIbhprJSGgpmRFcSCmJRoeFGJtFNlRWIRnKhCVKJLFES2ZFGOF3p2EWiQYjZXrYxxYOegM8KkqWhjx2IQY0Ls9NSZSEyWGzXq_1nbQRob5Tzflm-b6Uciks2fkCvE3GoAxgua2NclXTLz_kIf_tIC3C_JhDeyflpF-CKTNYhsokxfpxBY7b-bDtfu_IOyskMrDHnkve94bGR-OcYbsy_dTD68Sp73LqPdzJ3FH4KnT_pPerMDO4H5g18KwUJtHaKLzRJAoE1ZooqXBd05QSvQ4HEwzTh1IOJEU3qgA8RcDTvkwd4KkDfB2qDp7PhmNkNn55vwuVRufqMr28uG5twhxxlYaL_Z4tmMmHI7ON9CdXO8Uk9ODmrwF9B-c5Eb8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PtrProxy%3A+Efficient+code+re-randomization+on+AArch64+platform&rft.jtitle=China+communications&rft.au=Chenke%2C+Luo&rft.au=Jianming%2C+Fu&rft.au=Jiang%2C+Ming&rft.au=Mengfei%2C+Xie&rft.date=2025-06-01&rft.issn=1673-5447&rft.volume=22&rft.issue=6&rft.spage=64&rft.epage=82&rft_id=info:doi/10.23919%2FJCC.ja.2024-0077&rft.externalDBID=n%2Fa&rft.externalDocID=10_23919_JCC_ja_2024_0077
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1673-5447&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1673-5447&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1673-5447&client=summon