Etienne Louboutin
Directeur(s): Fabien Dagnat
Encadrant(s): Jean-Christophe Bach

SUJET DE THÈSE
Software sensitivity to control flow hijacking
Introduction and summary of the research
Software security can be taken into account right from the design stage. This approach, known as security by design, enables action to be taken as early as possible in the design phase to influence the architecture of the software. Protection against attacks by hijacking the flow of execution, such as return-oriented programming, is not designed to change the way software is designed, but enables software to be protected either when it is compiled or by working directly on the binary produced.
In this thesis, we propose metrics that allow a developer to assess the sensitivity of software to execution flow hijacking attacks. To aid development, the metrics defined make it possible to identify software binary production parameters that lead to increased sensitivity to these attacks. The use of these metrics is illustrated in this thesis by studying the influence of compilers and their options, languages and hardware architectures.
State of the art and context
The first attacks based on code reuse were called return-to-libc and diverted the flow of execution to call functions present in the standard C library to carry out the attack. In 2007, Shacham published a generalisation of these attacks that did not use explicit function calls, called a posteriori ROP. This article also shows the ability of these attacks to be Turing-complete.
In 2012, the same team returned to the subject, clarifying the concepts and how to carry out these attacks, implement them and analyse a program to find out what is relevant. This generalisation applies to both SPARC and x86 architectures. They also show that the standard C library is sufficient to mount attacks for any purpose.
Actions relating to detection and protection against this type of attack
A number of solutions have been put in place to protect against this type of attack, which I have analysed.
General Objectives and Future Actions
A cybersecurity awareness seminar was conducted for the staff at Thales Cholet.
An in-depth study of protection solutions against ROP attacks is planned for the coming month.
The main objectives currently defined include the static analysis of a system comprising one or more software components and hardware to gather insights into the feasibility of conducting an ROP attack on the system.
Another key objective is to establish a behavioral model of a system and develop an analyzer capable of detecting abnormal executions to report relevant information.
Publications
Etienne Louboutin. Sensibilité de logiciels au détournement de flot de contrôle. Génie logiciel [cs.SE]. Ecole nationale supérieure Mines-Télécom Atlantique, 2021. Français.
Étienne Louboutin, Jean-Christophe Bach, Fabien Dagnat. Statistical Measurement of Production Environment Influence on Code Reuse Availability. SECURWARE 2019 : The Thirteenth International Conference on Emerging Security Information, Systems and Technologies, Oct 2019, Nice, France.