作者
Elena Gabriela Barrantes, David H Ackley, Stephanie Forrest, Trek S Palmer, Darko Stefanovic, Dino Dai Zovi
发表日期
2003/10/27
图书
Proceedings of the 10th ACM conference on Computer and communications security
页码范围
281-289
简介
Binary code injection into an executing program is a common form of attack. Most current defenses against this form of attack use a 'guard all doors' strategy, trying to block the avenues by which execution can be diverted. We describe a complementary method of protection, which disrupts foreign code execution regardless of how the code is injected. A unique and private machine instruction set for each executing program would make it difficult for an outsider to design binary attack code against that program and impossible to use the same binary attack code against multiple machines. As a proof of concept, we describe a randomized instruction set emulator (RISE), based on the open-source Valgrind x86-to-x86 binary translator. The prototype disrupts binary code injection attacks against a program without requiring its recompilation, linking, or access to source code. The paper describes the RISE implementation …
引用总数
2003200420052006200720082009201020112012201320142015201620172018201920202021202220232194354283243313129334632371827211822158
学术搜索中的文章
EG Barrantes, DH Ackley, S Forrest, TS Palmer… - Proceedings of the 10th ACM conference on Computer …, 2003