首页> 外文期刊>IEEE transactions on dependable and secure computing >Install-time vaccination of Windows executables to defend against stack smashing attacks
【24h】

Install-time vaccination of Windows executables to defend against stack smashing attacks

机译:Windows可执行文件的安装时疫苗接种,以防御堆栈破坏攻击

获取原文
获取原文并翻译 | 示例

摘要

Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an anti-stack-smashing defense technique for Microsoft Windows systems. Our approach works at install-time, and does not rely on having access to the source-code: The user decides when and which executables to vaccinate. Our technique consists of instrumenting a given executable with a mechanism to detect stack smashing attacks. We developed a prototype implementing our technique and verified that it successfully defends against actual exploit code. We then extended our prototype to vaccinate DLLs, multithreaded applications, and DLLs used by multithreaded applications, which present significant additional complications. We present promising performance results measured on SPEC2000 benchmarks: Vaccinated executables were no more than 8 percent slower than their un-vaccinated originals.
机译:堆栈粉碎仍然是计算机系统攻击最流行的技术之一。在这项工作中,我们提出了一种针对Microsoft Windows系统的防堆栈砸防御技术。我们的方法在安装时起作用,并且不依赖于对源代码的访问:用户决定何时以及要接种哪些可执行文件。我们的技术包括使用一种机制来检测给定的可执行文件,以检测堆栈崩溃攻击。我们开发了实现我们技术的原型,并验证了该技术成功防御了实际的攻击代码。然后,我们将原型扩展为为DLL,多线程应用程序和多线程应用程序使用的DLL接种疫苗,这带来了明显的额外复杂性。我们提供了以SPEC2000基准测试为基础的有希望的性能结果:接种的可执行文件比未接种的原始文件慢8%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号