کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
458947 696208 2016 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
ROPocop — Dynamic mitigation of code-reuse attacks
ترجمه فارسی عنوان
ROBocop - کاهش دینامیکی حملات استفاده مجدد کد
کلمات کلیدی
سرریز بافر؛ برنامه ریزی بازگشتی حمله کد استفاده مجدد امنیت سیستم؛ کاهش بهره وری؛ باینری ابزار دقیق پویا
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques; but nevertheless, new exploits that successfully bypass these technologies still appear on a regular basis.In this paper, we propose ROPocop, a novel approach for detecting and preventing the execution of injected code and for mitigating code-reuse attacks such as return-oriented programming (RoP). ROPocop uses dynamic binary instrumentation, requiring neither access to source code nor debug symbols or changes to the operating system. It mitigates attacks both by monitoring the program counter at potentially dangerous points and by detecting suspicious program flows.We have implemented ROPocop for Windows x86 using PIN, a dynamic program instrumentation framework from Intel. Benchmarks using the SPEC CPU2006 suite show an average overhead of 2.4×, which is comparable to similar approaches, which give weaker guarantees. Real-world applications show only an initially noticeable input lag and no stutter. In our evaluation our tool successfully detected all 11 of the latest real-world code-reuse exploits, with no false alarms. Therefore, despite the overhead, it is a viable, temporary solution to secure critical systems against exploits if a vendor patch is not yet available.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Information Security and Applications - Volume 29, August 2016, Pages 16–26
نویسندگان
, ,