首页> 外文期刊>Operating systems review >Practical Taint-Based Protection using Demand Emulation
【24h】

Practical Taint-Based Protection using Demand Emulation

机译:使用需求仿真的基于污点的实用保护

获取原文
获取原文并翻译 | 示例
           

摘要

Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a well-known technique, data tainting, to track data received from the network as it propagates through a system and to prevent its execution. Unlike past approaches to taint tracking, which track tainted data by running the system completely in an emulator or simulator, resulting in considerable execution overhead, our work demonstrates the ability to dynamically switch a running system between virtualized and emulated execution. Using this technique, we are able to explore hardware support for taint-based protection that is deployable in real-world situations, as emulation is only used when tainted data is being processed by the CPU. By modifying the CPU, memory, and I/O devices to support taint tracking and protection, we guarantee that data received from the network may not be executed, even if it is written to, and later read from disk. We demonstrate near native speeds for workloads where little taint data is present.
机译:许多软件攻击都是基于将恶意代码注入目标主机。本文演示了如何使用众所周知的数据污染技术来跟踪从网络接收到的数据在系统中传播并阻止其执行。与过去的污点跟踪方法不同,后者通过在模拟器或模拟器中完全运行系统来跟踪污点数据,从而导致相当大的执行开销,而我们的工作展示了在虚拟和模拟执行之间动态切换运行系统的能力。使用此技术,我们能够探索对基于污点的保护的硬件支持,该保护可在现实环境中部署,因为仅在CPU处理污点数据时才使用仿真。通过修改CPU,内存和I / O设备以支持污点跟踪和保护,我们保证从网络接收到的数据即使写入磁盘并随后从磁盘读取也不会被执行。对于几乎没有异味数据的工作负载,我们展示了接近本机的速度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号