At the Dawn of CET: Hunting Valid Gadget with Big Data

Presented at SOURCE Seattle 2016, Oct. 13, 2016, 10 a.m. (40 minutes)

Control-flow Enforcement Technology (CET) is a new safety mechanism recently published by Intel in collaboration with Microsoft, with purpose to defend against the prevalent exploit techniques including Return-oriented Programming (ROP) and Call/Jmp-oriented Programming (COP/JOP). The CET is implemented at hardware level and contains two major parts: (1) Shadow stack, which detects and prevents ROP by double checking the integrity of the return address; (2) Indirect branch tracking, which hinders COP/JOP by making sure the target of a indirect branch is legal.

The indirect branch tracking is implemented by adding a new instruction, namely the ENDBRANCH, to mark the legal destinations of indirect branches. If ENDBRANCH is not the target of an indirect branch, CPU generates an exception (#CP fault) indicating unintended or malicious operation. Such mechanism is supposed to largely eliminate the JOP/COP type of attack. However, indirect branch tracking itself does not prevent exploits using gadget with legal entry point, theoretically leaving the possibility for JOP/COP to bypass CET using "legal gadgets" only.

This talk focuses on answering the question - how effective the indirect branch tracking is against JOP/COP? Are there still enough valid gadgets to use for any meaningful JOP/COP type attack?

In summary, this talk will provide the process and results for hunting valid gadgets under CET, using PMU-based tool and Big Data analysis. It presents an in-depth evaluation for the effectiveness of the indirect branch tracking technique, and It is our hope that the results of this study can help to improve the robustness of CET in future.


Presenters:

  • Xiaoning Li - Independent Security Researcher, Fortune 500 Company
    Xiaoning Li is a security researcher for a Fortune 500 company. For the past 10 years, his work has focused on vulnerability research, new exploit development, malware analysis, and reverse engineering.
  • Yanhui Zhao - Independent Security Researcher, Fortune 500 Company
    Yanhui Zhao is an independent security researcher. His research interests is big data analysis on malware analysis and machine learning. He holds a Ph.D degree on Engineering Science from Pennsylvania State University.
  • Ya Ou - Independent Security Researcher, Fortune 500 Company
    Ya Ou is an independent security researcher. His work has been focusing on new exploit development, malware analysis, and reverse engineering.
  • Ke Sun - Independent Security Researcher, Fortune 500 Company
    Ke Sun is an independent security researcher. He focuses on malware analysis and reverse engineering. Dr. Sun graduated from UCLA.

Similar Presentations: