首页> 外文学位 >Preventing buffer overflows with binary rewriting.
【24h】

Preventing buffer overflows with binary rewriting.

机译:通过二进制重写防止缓冲区溢出。

获取原文
获取原文并翻译 | 示例

摘要

Buffer overflows are the single largest cause of security attacks in recent times. Attacks based on this vulnerability have been the subject of extensive research and a significant number of defenses have been proposed for dealing with attacks of this nature. However, despite this extensive research, buffer overflows continue to be exploited due to the fact that many defenses proposed in prior research provide only partial coverage and attackers have adopted to exploit problems that are not well defended. The fact that many legacy binaries are still deployed in production environments also contributes to the success of buffer overflow attacks since most, if not all, buffer overflow defenses are source level defenses which require an application to be re-compiled. For many legacy applications, this may not be possible since the source code may no longer be available. In this thesis, we present an implementation of a defense mechanism for defending against various attack forms due to buffer overflows using binary rewriting. We study various attacks that happen in the real world and present techniques that can be employed within a binary rewriter to protect a binary from these attacks.;Binary rewriting is a nascent field and little research has been done regarding the applications of binary rewriting. In particular, there is great potential for applications of binary rewriting in software security. With a binary rewriter, a vulnerable application can be immediately secured without the need for access to it's source code which allows legacy binaries to be secured. Also, numerous attacks on application software assume that application binaries are laid out in certain ways or have certain characteristics. Our defense scheme implemented using binary rewriting technology can prevent many of these attacks. We demonstrate the effectiveness of our scheme in preventing many different attack forms based on buffer overflows on both synthetic benchmarks and real-world attacks.
机译:缓冲区溢出是最近发生安全攻击的最大原因。基于此漏洞的攻击已成为广泛研究的主题,并且已提出了大量防御措施来应对这种性质的攻击。但是,尽管进行了广泛的研究,但由于先前研究中提出的许多防御措施仅提供部分覆盖范围,并且攻击者已采用未充分防御的问题,因此仍继续利用缓冲区溢出。许多遗留二进制文件仍部署在生产环境中的事实也有助于缓冲区溢出攻击的成功,因为大多数(如果不是全部)缓冲区溢出防御是源级防御,需要重新编译应用程序。对于许多旧版应用程序,这可能是不可能的,因为源代码可能不再可用。在本文中,我们提出了一种防御机制的实现,该机制可以使用二进制重写来防御由于缓冲区溢出而导致的各种攻击形式。我们研究了现实世界中发生的各种攻击,并介绍了可在二进制重写器中使用的保护二进制免受这些攻击的技术。二进制重写是一个新兴领域,关于二进制重写的应用程序还很少进行研究。特别地,二进制重写在软件安全性中的应用具有很大的潜力。使用二进制重写器,可以立即保护易受攻击的应用程序,而无需访问其源代码,从而可以保护旧版二进制文件。同样,对应用程序软件的众多攻击都假定应用程序二进制文件以某种方式进行布局或具有某些特征。我们使用二进制重写技术实现的防御方案可以防止许多此类攻击。我们基于综合基准和实际攻击中的缓冲区溢出,展示了我们的方案在防止多种不同攻击形式方面的有效性。

著录项

  • 作者

    O'Sullivan, Padraig.;

  • 作者单位

    University of Maryland, College Park.;

  • 授予单位 University of Maryland, College Park.;
  • 学科 Computer Science.
  • 学位 M.E.
  • 年度 2010
  • 页码 46 p.
  • 总页数 46
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号