Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Code Specialization through Dynamic Feature Observation
 
conference paper

Code Specialization through Dynamic Feature Observation

Biswas, Priyam
•
Burow, Nathan
•
Payer, Mathias  
April 26, 2021
CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
11 ACM Conference on Data and Application Security and Privacy

Modern software (both programs and libraries) provides large amounts of functionality, vastly exceeding what is needed for a single given task. This additional functionality results in an increased attack surface: first, an attacker can use bugs in the unnecessary functionality to compromise the software, and second, defenses such as control-flow integrity (CFI) rely on conservative analyses that gradually lose precision with growing code size. Removing unnecessary functionality is challenging as the debloating mechanism must remove as much code as possible, while keeping code required for the program to function. Unfortunately, most software does not come with a formal description of the functionality that it provides, or even a mapping between functionality and code. We therefore require a mechanism that-given a set of representable inputs and configuration parameters-automatically infers the underlying functionality, and discovers all reachable code corresponding to this functionality. We propose Ancile, a code specialization technique that leverages fuzzing (based on user provided seeds) to discover the code necessary to perform the functionality required by the user. From this, we remove all unnecessary code and tailor indirect control-flow transfers to the minimum necessary for each location, vastly reducing the attack surface. We evaluate Ancile using real-world software known to have a large attack surface, including image libraries and network daemons like nginx. For example, our evaluation shows that Ancile can remove up to 93.66% of indirect call transfer targets and up to 78% of functions in libtiff's tiffcrop utility, while still maintaining its original functionality.

  • Details
  • Metrics
Type
conference paper
DOI
10.1145/3422337.3447844
Scopus ID

2-s2.0-85104994373

Author(s)
Biswas, Priyam

Purdue University

Burow, Nathan

Purdue University

Payer, Mathias  

École Polytechnique Fédérale de Lausanne

Date Issued

2021-04-26

Publisher

Association for Computing Machinery, Inc

Publisher place

New York

Published in
CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy
ISBN of the book

9781450381437

Start page

257

End page

268

Subjects

cfg

•

cfi

•

debloating

•

dynamic analysis

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent acronymEvent placeEvent date
11 ACM Conference on Data and Application Security and Privacy

Virtual, Online, United States

2021-04-26 - 2021-04-28

Available on Infoscience
April 4, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/248590
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés