首页> 外文会议>IEEE International Conference on Software Quality, Reliability and Security >Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking
【24h】

Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking

机译:通过执行位置等效性检查保护旧版代码免受控制劫持

获取原文

摘要

Current anomaly detection systems that enforce control flow integrity based on control flow graph information are not able to precisely monitor dynamic aspects of execution. Consequently, they are typically too coarse-grained to comprehensively detect modern code-reuse attacks. Even when enriched with dynamic monitoring information such as shadow stacks, the heuristics used are either too imprecise or produce many false negatives. In this paper, we present a novel approach to establish control flow integrity in multi-variant execution through execution location equivalence. The concept of execution location equivalence allows us to precisely detect execution divergence using a diversified control flow model and, consequently, to detect a broad variety of code-reuse attacks. In this way, execution of position-independent executables can be reliably rotected against a broad range of control hijacking attacks.
机译:当前基于控制流图信息来强制控制流完整性的异常检测系统不能精确地监视执行的动态方面。因此,它们通常过于粗糙,无法全面检测现代代码重用攻击。即使在丰富了动态监控信息(例如卷影堆栈)的情况下,使用的启发式方法还是太不精确或会产生许多假阴性。在本文中,我们提出了一种通过执行位置等效性在多变量执行中建立控制流完整性的新颖方法。执行位置等效性的概念使我们能够使用多样化的控制流模型来精确检测执行差异,从而检测多种代码重用攻击。通过这种方式,可以可靠地改变位置无关可执行文件的执行,以抵抗广泛的控制劫持攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号