首页> 外文期刊>IEEE transactions on dependable and secure computing >SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
【24h】

SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities

机译:SafeStack:自动修补基于堆栈的缓冲区溢出漏洞

获取原文
获取原文并翻译 | 示例

摘要

Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions proposed to provide adequate protection against buffer overflow attacks, most of existing solutions terminate the vulnerable program when the buffer overflow occurs, effectively rendering the program unavailable. The impact on availability is a serious problem on service-oriented platforms. This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities. The key technique of our solution is to virtualize memory accesses and move the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping normal system execution. We developed a prototype on a Linux system, and conducted extensive experiments to evaluate the effectiveness and performance of the system using a range of applications. Our experimental results showed that SafeStack can quickly generate runtime patches to successfully handle the attack's recurrence. Furthermore, SafeStack only incurs acceptable overhead for the patched applications.
机译:缓冲区溢出攻击仍然对当今的计算机系统的安全性和可用性构成严重威胁。尽管提出了许多解决方案来提供适当的保护以防止缓冲区溢出攻击,但是大多数现有解决方案都会在发生缓冲区溢出时终止易受攻击的程序,从而有效地使程序不可用。对可用性的影响在面向服务的平台上是一个严重的问题。本文介绍了SafeStack,该系统可以自动诊断和修补基于堆栈的缓冲区溢出漏洞。我们解决方案的关键技术是虚拟化内存访问并将易受攻击的缓冲区移动到受保护的内存区域,这在不停止正常系统执行的情况下提供了基本有效的保护,以防止再次发生相同的攻击。我们在Linux系统上开发了原型,并进行了广泛的实验,以使用一系列应用程序评估系统的有效性和性能。我们的实验结果表明,SafeStack可以快速生成运行时补丁以成功处理攻击的再次发生。此外,SafeStack仅为修补的应用程序产生可接受的开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号