首页> 外文会议>IEEE International Conference on Big Data Security on Cloud >Using Diversity to Harden Multithreaded Programs Against Exploitation
【24h】

Using Diversity to Harden Multithreaded Programs Against Exploitation

机译:利用多样性来消除剥削的多标

获取原文

摘要

Multithreaded programming is here to stay, and concurrency bugs are the focus of a growing number of cyberattacks. While most defensive efforts against such attacks seek to identify bugs during debugging, an alternative method seeks to make exploitation harder without the need to first identify the bugs -- or even the fact that there are any. Time randomization introduces more diversity among instances of the same software. In much the same way that ASLR-induced diversity in memory locations thwarts attacks crafted for specific addresses, time randomization-induced diversity in thread timing aims to thwart concurrency attacks crafted for specific vulnerability windows. We study three implementations of time randomization, all using the injection of NOPs to alter program timing. Their application to two real-world concurrency bugs results in a marked increase in the cost to exploit those bugs. After demonstrating the effectiveness of the method, especially when NOPs are injected before library function calls following synchronization points, methods for improving the efficiency of this defense against concurrency attacks in future research are proposed.
机译:多线程编程在这里保持,并发突发错误是越来越多的网络ack的焦点。虽然对这种攻击的大多数防御措施都试图在调试期间寻求识别错误,但备份方法旨在使利用更加努力,而无需首先识别错误 - 甚至有任何事实。时间随机化在同一软件的实例中引入了更多的多样性。与ASLR引起的内存位置的多样性相同的方式,陷入特定地址的攻击,时间随机化诱导的线程时序的多样性旨在挫败为特定漏洞窗口制作的并发攻击。我们研究了三次时间随机化的实现,所有这些都使用NOP注射来改变程序定时。它们在两个真实的并发错误中的应用导致剥削这些错误的成本的显着增加。在展示该方法的有效性之后,特别是当在图书馆函数之后注入NOPS的同步点之前,提出了提高这种防御效率的方法,以在将来的并发攻击中进行并发攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号