【24h】

Transparent runtime randomization for security

机译:透明的运行时随机化以提高安全性

获取原文

摘要

A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes transparent runtime randomization (TRR), a generalized approach for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program's stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program's memory layout different each time it runs foils the attacker's assumptions about the memory layout of the vulnerable program and makes the determination of critical address values difficult if not impossible. TRR is implemented by changing the Linux dynamic program loader, hence it is transparent to applications. We demonstrate that TRR is effective in defeating real security attacks, including malloc-based heap overflow, integer overflow, and double-free attacks, for which effective prevention mechanisms are yet to emerge. Furthermore, TRR incurs less than 9% program startup overhead and no runtime overhead.
机译:大量的安全攻击利用了软件实现漏洞,例如未经检查的缓冲区。本文提出了透明的运行时随机化(TRR),这是一种针对各种安全攻击的通用方法。 TRR在应用程序内存地址空间内动态随机地重定位程序的堆栈,堆,共享库及其运行时控制数据结构的一部分。程序每次运行时都使程序的内存布局不同,这会破坏攻击者对易受攻击程序的内存布局的假设,并使得即使不是不可能的情况下,也很难确定关键地址值。通过更改Linux动态程序加载器来实现TRR,因此它对应用程序是透明的。我们证明了TRR可以有效地抵抗真正的安全攻击,包括基于malloc的堆溢出,整数溢出和双重释放攻击,而对于这些攻击而言,有效的预防机制尚未出现。此外,TRR产生的程序启动开销不到9%,并且没有运行时开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号