作者
Ryan Riley, Xuxian Jiang, Dongyan Xu
发表日期
2010/10
期刊
IEEE Transactions on Dependable and Secure Computing
卷号
7
期号
4
页码范围
351-365
出版商
IEEE
简介
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the execute-disable bit and PaX have been useful in limiting the attacks; however, they enforce program layout restrictions and can oftentimes still be circumvented by a determined attacker. We propose a change to the memory architecture of modern processors that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory such that a processor will never be able to fetch injected code for execution. This virtual split memory system can be implemented as a software-only patch to an operating system and can be used to supplement existing schemes for improved protection. Furthermore, our system is able to accommodate a number of response modes when a code injection attack occurs. Our experiments with both benchmarks and …
引用总数
20092010201120122013201420152016201720182019202020212022202347588101064344232
学术搜索中的文章
R Riley, X Jiang, D Xu - IEEE Transactions on Dependable and Secure …, 2010