首页> 外文会议>Information security practice and experience. >Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization
【24h】

Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization

机译:使用硬件虚拟化防止面向内核返回的编程攻击

获取原文
获取原文并翻译 | 示例

摘要

ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attack is great challenge to existing defenses because attackers have system privilege, little prerequisite to mount attacks, and the disability of existing countermeasures against runtime attacks. A method preventing kernel return-oriented programming attack is proposed, which creates a separated secret address space for control data taking advantage of VMM architecture. The secret address space is implemented as a shadow stack on the same host with the target OS facilited by hardware virtualization techniques. The experience result shows the performance overhead in our implementation is about 10% and acceptable in practical.
机译:本文简要介绍的ROP攻击是对计算系统的严重威胁。内核ROP攻击是对现有防御的巨大挑战,因为攻击者具有系统特权,发起攻击的先决条件很少,并且无法抵抗运行时攻击的现有对策。提出了一种防止面向内核返回的编程攻击的方法,该方法利用VMM架构为控制数据创建了单独的秘密地址空间。秘密地址空间被实现为与目标操作系统通过硬件虚拟化技术在同一主机上的影子堆栈。经验结果表明,在我们的实现中,性能开销约为10%,在实践中是可以接受的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号