首页> 外文OA文献 >Countering Code Injection Attacks With Instruction Set Randomization
【2h】

Countering Code Injection Attacks With Instruction Set Randomization

机译:使用指令集随机化来应对代码注入攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff's principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does not know the key to the randomization algorithm will inject code that is invalid for that randomized processor, causing a runtime exception. To determine the difficulty of integrating support for the proposed mechanism in the operating system, we modified the Linux kernel, the GNU binutils tools, and the bochs-x86 emulator. Although the performance penalty is significant, our prototype demonstrates the feasibility of the approach, and should be directly usable on a suitable-modified processor (e.g., the Transmeta Crusoe).Our approach is equally applicable against code-injecting attacks in scripting and interpreted languages, e.g., web-based SQL injection. We demonstrate this by modifying the Perl interpreter to permit randomized script execution. The performance penalty in this case is minimal. Where our proposed approach is feasible (i.e., in an emulated environment, in the presence of programmable or specialized hardware, or in interpreted languages), it can serve as a low-overhead protection mechanism, and can easily complement other mechanisms.
机译:我们描述了一种保护系统免受任何类型的代码注入攻击的通用方法。我们通过创建执行潜在漏洞软件的系统的特定于进程的随机指令集(例如机器指令)来应用Kerckhoff原理。不知道随机算法密钥的攻击者将注入对该随机处理器无效的代码,从而导致运行时异常。为了确定在操作系统中集成对提议的机制的支持的难度,我们修改了Linux内核,GNU binutils工具和bochs-x86仿真器。尽管性能损失很大,但是我们的原型证明了该方法的可行性,并且应该可以在经过适当修改的处理器(例如Transmeta Crusoe)上直接使用。我们的方法同样适用于脚本和解释语言的代码注入攻击,例如基于Web的SQL注入。我们通过修改Perl解释器以允许随机脚本执行来证明这一点。在这种情况下,性能损失很小。在我们提出的方法可行的情况下(即在仿真环境中,存在可编程或专用硬件或解释性语言的情况下),它可以充当低开销的保护机制,并且可以轻松地补充其他机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号