Defending return-oriented programming based on virtualization techniques
文献类型:期刊论文
作者 | Xiaoqi Jia ; Rui Wang ; Jun Jiang ; Shengzhi Zhang ; Peng Liu |
刊名 | Security and Communication Networks
![]() |
出版日期 | 2013-10 |
卷号 | Volume 6期号:Issue 10页码:1236-1249 |
关键词 | return-oriented programming hypervisor-based security hardware-assisted virtualization |
合作状况 | 国际 |
中文摘要 | Over the past few years, return-oriented programming (ROP) has drawn great attention of both academia and industry. Because of its Turing completeness, ROP reuses short instruction sequences already present in the victim program's address space to perform arbitrary computation. Hence, it can successfully bypass state-of-the-art code integrity check mechanisms. In this paper, we look into using virtualization technologies to defeat return-oriented programming. We design and implement HyperCropII, a virtualization-based automatic runtime approach to defend such attacks. ROP attackers extract short instruction sequences ending in ret called "gadgets" and craft stack content to "chain" these gadgets together. We observe that a key characteristic of ROP is to fill the stack with plenty of addresses that are within the range of the program's libraries. Accordingly, we inspect the content of the stack to see if a potential ROP attack exists and quarantine the damages for further security purposes. We have implemented a proof-of-concept system based on the open source Xen hypervisor. The evaluation results exhibit that our solution is effective and efficient. |
学科主题 | 数据安全与计算机安全 ; 计算机系统设计 ; 操作系统与操作环境 ; 程序设计及其语言 ; 编译系统 |
收录类别 | SCI ; EI |
语种 | 英语 |
WOS记录号 | WOS:000325110400005 |
公开日期 | 2013-04-11 |
源URL | [http://ir.iscas.ac.cn/handle/311060/14768] ![]() |
专题 | 软件研究所_信息安全国家重点实验室_期刊论文 |
推荐引用方式 GB/T 7714 | Xiaoqi Jia,Rui Wang,Jun Jiang,et al. Defending return-oriented programming based on virtualization techniques[J]. Security and Communication Networks,2013,Volume 6(Issue 10):1236-1249. |
APA | Xiaoqi Jia,Rui Wang,Jun Jiang,Shengzhi Zhang,&Peng Liu.(2013).Defending return-oriented programming based on virtualization techniques.Security and Communication Networks,Volume 6(Issue 10),1236-1249. |
MLA | Xiaoqi Jia,et al."Defending return-oriented programming based on virtualization techniques".Security and Communication Networks Volume 6.Issue 10(2013):1236-1249. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。