首页> 外文会议>International Conference on Software Engineering >Stack Layout Transformation: Towards Diversity for Securing Binary Programs
【24h】

Stack Layout Transformation: Towards Diversity for Securing Binary Programs

机译:堆栈布局转换:迈向固定二进制程序的多样性

获取原文

摘要

Despite protracted efforts by both researchers and practitioners, security vulnerabilities remain in modern software. Artificial diversity is an effective defense against many types of attack, and one form, address-space randomization, has been widely applied. Present artificial diversity implementations are either coarse-grained or require source code. Because of the widespread use of software of unknown provenance, e.g., libraries, where no source code is provided or available, building diversity into the source code is not always possible. I investigate an approach to stack layout transformation that operates on ×86 binary programs, which would allow users to obfuscate vulnerabilities and increase their confidence in the software's dependability. The proposed approach is speculative: the stack frame layout for a function is inferred from the binary and assessed by executing the transformed program. Upon assessment failure, the inferred layout is refined in hopes to better reflect the actual function layout.
机译:尽管研究人员和从业者的努力,但安全漏洞仍然存在现代软件。人工多样性是针对许多类型的攻击的有效防御,一种形式,地址空间随机化已被广泛应用。呈现人工多样性实现是粗粒或需要源代码。由于广泛使用来源不明,如图书馆,在那里没有源代码提供或可用,构建多元化到源代码的软件是不可能的。我调查了堆栈布局转换的方法,该转换运行×86二进制程序,这将允许用户使用漏洞并增加对软件可靠性的信心。所提出的方法是猜测:从二进制中推断出函数的堆栈帧布局,并通过执行变换的程序进行评估。在评估失败后,提出了推断的布局,希望能够更好地反映实际的功能布局。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号