首页> 外文会议>International Conference on Computational Intelligence and Security pt.2 >Protection Against Format String Attacks by Binary Rewriting
【24h】

Protection Against Format String Attacks by Binary Rewriting

机译:通过二进制重写防范格式字符串攻击

获取原文

摘要

We propose a binary rewriting system called Kimchi that modifies binary programs to protect them from format string attacks in runtime. Kimchi replaces the machine code calling conventional printf with code calling a safer version of printf, safe_printf, that prevents its format string from accessing arguments exceeding the stack frame of the parent function. With the proposed static analysis and binary rewriting method, it can protect binary programs even if they do not use the frame pointer register or link the printf code statically. In addition, it replaces the printf calls without extra format arguments like printf (buffer) with the safe code printf ("%s", buffer), which are not vulnerable, and reduces the performance overhead of the patched program by not modifying the calls to printf with the format string argument located in the read-only memory segment, which are not vulnerable to the format string attack.
机译:我们提出了一个名为Kimchi的二进制重写系统,该系统修改二进制程序以保护它们免受运行时中的格式字符串攻击。 kimchi替换机器代码调用传统的printf,代码调用更安全版本的printf,safe_printf,它可以防止其格式字符串访问父函数的堆栈帧的参数。通过提出的静态分析和二进制重写方法,即使它们不使用帧指针寄存器或静态链接PRINTF代码,也可以保护二进制程序。此外,它还替换了Printf呼叫,无需使用PrintF(缓冲区)等额外格式参数,安全代码Printf(“%s”,buffer),它不易受攻击,并且通过不修改调用来降低修补程序的性能开销要使用位于只读内存段中的格式字符串参数,它不容易受到格式字符串攻击的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号