...
首页> 外文期刊>International Journal of Information Technology and Computer Science >A System Call Randomization Based Method for Countering Code-Injection Attacks
【24h】

A System Call Randomization Based Method for Countering Code-Injection Attacks

机译:基于系统调用随机化的反码注入攻击方法

获取原文
           

摘要

Code-injection attacks pose serious threat to today’s Internet. The existing code-injection attack defense methods have some deficiencies on performance overhead and effectiveness. To this end, we propose a method that uses system called randomization to counter code injection attacks based on instruction set randomization idea. System calls must be used when an injected code would perform its actions. By creating randomized system calls of the target process, an attacker who does not know the key to the randomization algorithm will inject code that isn’t randomized like as the target process and is invalid for the corresponding de-randomized module. The injected code would fail to execute without calling system calls correctly. Moreover, with extended complier, our method creates source code randomization during its compiling and implements binary executable files randomization by feature matching. Our experiments on built prototype show that our method can effectively counter variety code injection attacks with low-overhead.
机译:注入代码攻击对当今的互联网构成了严重威胁。现有的代码注入攻击防御方法在性能开销和有效性方面存在一些缺陷。为此,我们提出了一种基于指令集随机化思想的使用称为随机化的系统来对抗代码注入攻击的方法。当注入的代码执行其操作时,必须使用系统调用。通过创建目标进程的随机系统调用,不知道随机算法密钥的攻击者将注入未随机化的代码,就像目标进程一样,并且对于相应的非随机模块无效。如果不正确调用系统调用,注入的代码将无法执行。此外,通过扩展编译器,我们的方法在编译期间创建了源代码随机化,并通过特征匹配实现了二进制可执行文件的随机化。我们在构建的原型上进行的实验表明,我们的方法可以有效地应对开销低的各种代码注入攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号