首页> 外文学位 >Architectural approaches for code injection defense at the user and kernel levels.
【24h】

Architectural approaches for code injection defense at the user and kernel levels.

机译:在用户和内核级别进行代码注入防御的体系结构方法。

获取原文
获取原文并翻译 | 示例

摘要

Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the execute-disable bit have been useful in limiting the attacks, however they enforce program layout restrictions and can often still be circumvented by a determined attacker. In this dissertation, we analyze the code injection problem from the perspective of a vulnerable system's memory architecture. We propose an alternative memory architecture, the split memory architecture (SMA), which is not susceptible to code injection attacks. This memory architecture can be implemented either in software running on a von Neumann memory architecture or through slight modifications to the von Neumann architecture. The SMA is also able to support the execution of unmodified programs and operating systems designed and compiled for a von Neumann system.;We demonstrate the efficacy of the SMA approach at the user-level by presenting the design, implementation, and evaluation of an operating system level patch to run a process inside an SMA. The results show that the system is able to prevent a variety of code injection attacks while imposing less than 20% overhead on average.;We also demonstrate an SMA at the kernel-level with NICKLE, an instantiation of an SMA in a virtual machine monitor (VMM). We use NICKLE to verify the applicability of the SMA design to the prevention of code injection based kernel rootkits. Our evaluation reveals that NICKLE is able to prevent the execution of these rootkits while imposing less than 10% overhead to QEMU. The VMM-based SMA is also used as the basis for a rootkit profiler named PoKeR, which is able to help human experts determine the behavior of a rootkit.;Our results reveal that the SMA can be a solution for preventing code injection attacks in both user-level applications and the operating system kernel.
机译:尽管进行了充分研究,但是代码注入攻击今天仍然是一个问题。诸如禁用执行位之类的现代体系结构解决方案在限制攻击方面很有用,但是它们会强制执行程序布局限制,并且通常仍然可以由坚定的攻击者规避。本文从易受攻击的系统的内存体系结构的角度分析了代码注入问题。我们提出了另一种内存架构,即拆分内存架构(SMA),它不易受代码注入攻击。可以在运行于von Neumann内存架构上的软件中实现该内存架构,也可以通过对von Neumann架构稍加修改来实现。 SMA还能够支持为von Neumann系统设计和编译的未修改程序和操作系统的执行。;我们通过介绍操作的设计,实现和评估,在用户级别证明SMA方法的功效。系统级补丁程序,以在SMA内部运行进程。结果表明,该系统能够在平均不到20%的开销的情况下防止各种代码注入攻击。;我们还使用NICKLE演示了内核级别的SMA,这是在虚拟机监视器中实例化的SMA (VMM)。我们使用NICKLE来验证SMA设计对防止基于代码注入的内核rootkit的适用性。我们的评估表明,NICKLE能够阻止这些rootkit的执行,同时给QEMU带来不到10%的开销。基于VMM的SMA还用作名为PoKeR的rootkit探查器的基础,该探查器可以帮助人类专家确定rootkit的行为。;我们的结果表明,SMA可以作为在两种情况下均防止代码注入攻击的解决方案用户级应用程序和操作系统内核。

著录项

  • 作者

    Riley, Ryan D.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 146 p.
  • 总页数 146
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号