首页> 外文会议>IEEE International Conference on Advanced Information Networking and Applications >Mitigating Use-After-Free Attack with Application Program Loader
【24h】

Mitigating Use-After-Free Attack with Application Program Loader

机译:通过应用程序加载程序缓解免费使用后攻击

获取原文

摘要

In the area of software security, use-after-free vulnerabilities have been reported since 2006. When the target vulnerable application is run, the attack exploits a dangling pointer after the heap memory is released. Until today, use-after-free attacks have been frequently reported in popular software such as browsers. This is a serious software security problem because a use-after-free attack allows an attacker to execute an arbitrary code to hijack an application control flow or to force a system crash. Some countermeasures have been proposed to thwart such attacks. However, most of these countermeasures have some problems such as the necessity of a source code or the problem of dependency. In this paper, we propose and evaluate the implementation of an application-level program loader to mitigate the use-after-free attack.
机译:在软件安全领域,自2006年以来,已经报告过使用后使用漏洞。当目标易受攻击的应用程序运行时,攻击将在释放堆内存后利用悬挂指针。直到今天,在流行的软件(如浏览器)中,经常有使用后使用的攻击的报道。这是一个严重的软件安全问题,因为“用后使用”攻击使攻击者可以执行任意代码来劫持应用程序控制流或迫使系统崩溃。已经提出了一些阻止这种攻击的对策。但是,这些对策中的大多数都有一些问题,例如需要源代码或依赖问题。在本文中,我们提出并评估了应用程序级程序加载器的实现,以减轻无用后攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号