【24h】

Exploiting Trust in Deterministic Builds

机译:利用确定性构建的信任

获取原文

摘要

Deterministic builds, where the compile and build processes are reproducible, can be used to achieve increased trust in distributed binaries. As the trust can be distributed across a set of builders, where all provide their own signature of a byte-to-byte identical binary, all have to cooperate in order to introduce unwanted code in the binary. On the other hand, if an attacker manages to incorporate malicious code in the source, and make this remain undetected during code reviews, the deterministic build provides additional opportunities to introduce e.g., a backdoor. The impact of such a successful attack would be serious since the actual trust model is exploited. In this paper, the problem of crafting such hidden code that is difficult to detect, both during code reviews of the source code as well as static analysis of the binary executable is addressed. It is shown that the displacement and immediate fields of an instruction can be used the embed hidden code directly from the C programming language.
机译:确定性构建,其中编译和构建过程可重复,可用于在分布式二进制文件中实现增加的信任。由于信任可以分布在一组建设者上,其中全部提供自己的字节到字节相同的二进制文件的签名,所有这些都必须协作,以便在二进制中引入不需要的代码。另一方面,如果攻击者设法在源代码中纳入恶意代码,并且在守则评价期间使这仍未被遗留,但确定性的构建提供了额外的机会,介绍例如后门。由于利用实际的信任模式,这种成功攻击的影响将是严重的。在本文中,解决了难以检测的这种隐藏代码的问题,包括在源代码的代码审查期间以及二进制可执行文件的静态分析中。结果表明,指令的位移和立即场可以直接从C编程语言中使用嵌入的隐藏代码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号