首页> 外文会议>Software Engineering (ICSE), 2012 34th International Conference on >Stack layout transformation: Towards diversity for securing binary programs
【24h】

Stack layout transformation: Towards diversity for securing binary programs

机译:堆栈布局转换:实现多样性以保护二进制程序

获取原文
获取原文并翻译 | 示例

摘要

Despite protracted efforts by both researchers and practitioners, security vulnerabilities remain in modern software. Artificial diversity is an effective defense against many types of attack, and one form, address-space randomization, has been widely applied. Present artificial diversity implementations are either coarse-grained or require source code. Because of the widespread use of software of unknown provenance, e.g., libraries, where no source code is provided or available, building diversity into the source code is not always possible. I investigate an approach to stack layout transformation that operates on x86 binary programs, which would allow users to obfuscate vulnerabilities and increase their confidence in the software's dependability. The proposed approach is speculative: the stack frame layout for a function is inferred from the binary and assessed by executing the transformed program. Upon assessment failure, the inferred layout is refined in hopes to better reflect the actual function layout.
机译:尽管研究人员和从业人员都进行了长期的努力,但现代软件仍然存在安全漏洞。人工多样性是对多种攻击的有效防御,一种形式的地址空间随机化已被广泛应用。当前的人工分集实现要么是粗粒度的,要么需要源代码。由于来源不明的软件(例如,图书馆)的广泛使用,其中没有提供或可用的源代码,所以总不能在源代码中建立多样性。我研究了一种在x86二进制程序上运行的堆栈布局转换方法,该方法将允许用户掩盖漏洞并增强对软件可靠性的信心。所提出的方法是推测性的:从二进制文件中推断出函数的堆栈框架布局,并通过执行转换后的程序对其进行评估。在评估失败时,将对推断出的布局进行改进,以期更好地反映实际功能布局。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号