A Data Flow Behavior Constraints Model for Branch Decisionmaking Variables

In order to detect the attacks to decision-making variable , this paper presents a data flow behavior constraint model for branch decision-making variables. Our model is expanded from the co mmon control flow model, it emphasizes on the analysis and verification about the data flo w for decision-making variab les, so that to ensure the branch statement can execute correctly and can also detect the attack to branch decision-making variab le easily. The constraints of our model include the collect ion of variables, the statements that the decision-making variables are dependent on and the data flow constraint with the use-def relat ion of these variables. Our experimental results indicate that it is effective in detecting the attacks to branch decision-making variables as well as the attacks to control-data.

[1]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[2]  David W. Binkley,et al.  Interprocedural slicing using dependence graphs , 1990, TOPL.

[3]  Daniel Amyot,et al.  Recovering behavioral design models from execution traces , 2005, Ninth European Conference on Software Maintenance and Reengineering.

[4]  Tao Qin,et al.  Discovering use cases from source code using the branch-reserving call graph , 2003, Tenth Asia-Pacific Software Engineering Conference, 2003..

[5]  Thomas Reps,et al.  Interprocedural slicing using dependence graphs (with retrospective) , 1988, ACM-SIGPLAN Symposium on Programming Language Design and Implementation.

[6]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[7]  Jun Xu,et al.  Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.

[8]  Weibo Gong,et al.  Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..