首页> 外文OA文献 >e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
【2h】

e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing

机译:e-NeXSh:通过系统调用策略实现有效的不可执行堆栈和堆

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vulnerabilities in software to override its program control-flow and consequently invoke system calls, causing out-of-process damage. Our technique defeats such attacks by monitoring all LIBC function and system-call invocations, and validating them against process-specific information that strictly prescribes the permissible behaviour for the program (unlike general sandboxing techniques that require manually maintained, explicit policies, we use the program code itself as a guideline for an implicit policy). Any deviation from this behaviour is considered malicious, and we halt the attack, limiting its damage to within the subverted process. We implemented e-NeXSh as a set of modifications to the Linux-2.4.18-3 kernel and a new user-space shared library (e-NeXSh.so). The technique is transparent, requiring no modifications to existing libraries or applications. e-NeXSh was able to successfully defeat both code-injection and LIBC-based attacks in our effectiveness tests. The technique is simple and lightweight, demonstrating no measurable overhead for select UNIX utilities, and a negligible 1.55% performance impact on the Apache Web server.
机译:我们介绍e-NeXSh,这是一种新颖的安全性方法,它利用内核和LIBC支持来有效防御系统对进程破坏的攻击。此类攻击利用软件中的漏洞来覆盖其程序控制流,并因此调用系统调用,从而导致进程外破坏。我们的技术通过监视所有LIBC功能和系统调用,并根据严格规定了程序允许行为的特定于进程的信息对它们进行攻击,从而克服了此类攻击(与需要手动维护的显式策略的常规沙盒技术不同,我们使用该程序代码本身作为隐式策略的指南)。任何违反此行为的行为都被视为恶意行为,我们停止了攻击,将其破坏范围限制在颠覆性的过程中。我们将e-NeXSh实施为对Linux-2.4.18-3内核的一组修改和一个新的用户空间共享库(e-NeXSh.so)。该技术是透明的,不需要修改现有的库或应用程序。在我们的有效性测试中,e-NeXSh能够成功击败代码注入和基于LIBC的攻击。该技术简单,轻巧,对选定的UNIX实用程序而言,没有可测量的开销,并且对Apache Web服务器的性能影响可忽略不计1.55%。

著录项

  • 作者单位
  • 年度 2005
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号