Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
Saved in:
| Title: | Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution |
|---|---|
| Authors: | Portokalidis, Georgios, Keromytis, Angelos D |
| Contributors: | COLUMBIA UNIV NEW YORK DEPT OF COMPUTER SCIENCE |
| Source: | DTIC |
| Publication Year: | 2010 |
| Collection: | Defense Technical Information Center: DTIC Technical Reports database |
| Subject Terms: | Computer Programming and Software, Computer Systems Management and Standards, COMPUTER PROGRAMS, COMPUTER PROGRAMMING, DATA PROCESSING SECURITY, SYMPOSIA, ISR(INSTRUCTION-SET RANDOMIZATION), CODE INJECTION ATTACKS |
| Description: | Instruction-set randomization (ISR) obfuscates the language understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim's filesystem and successfully launch them, bypassing most mechanisms proposed to counter buffer overflows. We propose the holistic adoption of ISR across the software stack, preventing the execution of unauthorized binaries and scripts regardless of their origin. Our approach requires that programs be randomized with di erent keys during a user-controlled installation, effectively combining the benefits of code whitelisting/signing and runtime program integrity. We discuss how an ISR-enabled environment for binaries can be implemented with little overhead in hardware, and show that higher-overhead software-only alternatives are possible. We use Perl and SQL to demonstrate the application of ISR in scripting environments with negligible overhead. ; In Proceedings of the ARO Workshop on Moving Target Defense, p49-76, October 2010, Fairfax, VA. Sponsored in part by AFRL. U.S. Government or Federal Rights License |
| Document Type: | text |
| File Description: | text/html |
| Language: | English |
| Relation: | http://www.dtic.mil/docs/citations/ADA557729 |
| Availability: | http://www.dtic.mil/docs/citations/ADA557729 http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA557729 |
| Rights: | Approved for public release; distribution is unlimited. |
| Accession Number: | edsbas.A3F2598A |
| Database: | BASE |
| Abstract: | Instruction-set randomization (ISR) obfuscates the language understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim's filesystem and successfully launch them, bypassing most mechanisms proposed to counter buffer overflows. We propose the holistic adoption of ISR across the software stack, preventing the execution of unauthorized binaries and scripts regardless of their origin. Our approach requires that programs be randomized with di erent keys during a user-controlled installation, effectively combining the benefits of code whitelisting/signing and runtime program integrity. We discuss how an ISR-enabled environment for binaries can be implemented with little overhead in hardware, and show that higher-overhead software-only alternatives are possible. We use Perl and SQL to demonstrate the application of ISR in scripting environments with negligible overhead. ; In Proceedings of the ARO Workshop on Moving Target Defense, p49-76, October 2010, Fairfax, VA. Sponsored in part by AFRL. U.S. Government or Federal Rights License |
|---|
Nájsť tento článok vo Web of Science