【24h】

Against Code Injection with System Call Randomization

机译:防止代码注入和系统调用随机化

获取原文
获取外文期刊封面目录资料

摘要

The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization to counter code injection attacks based on instruction set randomization idea. An injected code would perform its actions with system calls. System call randomization on operating system level will prevent the injected code from executing correctly. Moreover, with an extended compiler, our method can perform source code randomization during compiling and implement binary executable files randomization by feature matching. The experiments show that our method can effectively counter variety code injection attacks with low overhead.
机译:现有的代码注入攻击防御方法在性能开销和有效性方面存在一些缺陷。为了保证系统性能,我们提出了一种基于指令集随机化思想的利用系统调用随机化来对抗代码注入攻击的方法。注入的代码将通过系统调用执行其动作。在操作系统级别进行系统调用随机化将阻止注入的代码正确执行。而且,使用扩展的编译器,我们的方法可以在编译期间执行源代码随机化,并通过特征匹配实现二进制可执行文件随机化。实验表明,该方法能够以较低的开销有效地应对各种代码注入攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号