首页> 外文会议>ACM conference on Computer and communications security >Randomized instruction set emulation to disrupt binary code injection attacks
【24h】

Randomized instruction set emulation to disrupt binary code injection attacks

机译:随机指令集仿真可破坏二进制代码注入攻击

获取原文

摘要

Binary code injection into an executing program is a common form of attack. Most current defenses against this form of attack use a 'guard all doors' strategy, trying to block the avenues by which execution can be diverted. We describe a complementary method of protection, which disrupts foreign code execution regardless of how the code is injected. A unique and private machine instruction set for each executing program would make it difficult for an outsider to design binary attack code against that program and impossible to use the same binary attack code against multiple machines. As a proof of concept, we describe a randomized instruction set emulator (RISE), based on the open-source Valgrind x86-to-x86 binary translator. The prototype disrupts binary code injection attacks against a program without requiring its recompilation, linking, or access to source code. The paper describes the RISE implementation and its limitations, gives evidence demonstrating that RISE defeats common attacks, considers how the dense x86 instruction set affects the method, and discusses potential extensions of the idea.
机译:将二进制代码注入到执行程序中是一种常见的攻击形式。当前针对这种攻击形式的大多数防御措施都采用“全方位防御”策略,试图阻止可以改变执行力的途径。我们描述了一种互补的保护方法,该方法会中断外来代码的执行,而无论代码如何注入。对于每个正在执行的程序,唯一且专用的机器指令集将使局外人难以针对该程序设计二进制攻击代码,并且无法针对多个机器使用相同的二进制攻击代码。作为概念的证明,我们基于开放源代码Valgrind x86到x86二进制转换器描述了随机指令集仿真器(RISE)。该原型可以破坏对程序的二进制代码注入攻击,而无需重新编译,链接或访问源代码。本文描述了RISE的实现及其局限性,提供了证明RISE可以克服常见攻击的证据,考虑了密集的x86指令集如何影响该方法,并讨论了该思想的潜在扩展。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号