【24h】

Secure Untrusted Binaries — Provably!

机译:确保不受信任的二进制文件 - 可证明!

获取原文

摘要

A standard method for securing untrusted code is code rewriting, whereby operations that might compromise a safety policy are secured by additional dynamic checks. In this paper, we propose a novel approach to sandboxing that is based on a combination of code rewriting and hardware-based memory protection. In contrast to previous work, we perform rewriting on raw binary code and provide a machine-checkable proof of safety that includes the interaction of the untrusted binary with the operating system. This proof constitutes a crucial step towards the use of rewritten binaries with proof-carrying code.
机译:用于保护不受信任代码的标准方法是代码重写,由此可以通过额外的动态检查来保护可能损害安全策略的操作。在本文中,我们提出了一种基于代码重写和基于硬件的内存保护的组合的沙箱的新方法。与以前的工作相比,我们对原始二进制代码进行重写,并提供机器可审查的安全证明,包括不受信任的二进制与操作系统的交互。该证据构成了使用具有验证代码的重写二进制文件的重要步骤。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号