中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 期刊论文
Subject: 计算机科学技术基础学科::数据安全与计算机安全 ; 计算机系统结构::计算机系统设计 ; 计算机软件::操作系统与操作环境 ; 计算机软件::程序设计及其语言 ; 计算机软件::编译系统
Title:
Defending return-oriented programming based on virtualization techniques
Author: Xiaoqi Jia ; Rui Wang ; Jun Jiang ; Shengzhi Zhang ; Peng Liu
Keyword: return-oriented programming ; hypervisor-based security ; hardware-assisted virtualization
Source: Security and Communication Networks
Issued Date: 2013-10
Volume: Volume 6, Issue:Issue 10, Pages:1236-1249
Indexed Type: SCI ; EI
Cooperation Status: 国际
Abstract: Over the past few years, return-oriented programming (ROP) has drawn great attention of both academia and industry. Because of its Turing completeness, ROP reuses short instruction sequences already present in the victim program's address space to perform arbitrary computation. Hence, it can successfully bypass state-of-the-art code integrity check mechanisms. In this paper, we look into using virtualization technologies to defeat return-oriented programming. We design and implement HyperCropII, a virtualization-based automatic runtime approach to defend such attacks. ROP attackers extract short instruction sequences ending in ret called "gadgets" and craft stack content to "chain" these gadgets together. We observe that a key characteristic of ROP is to fill the stack with plenty of addresses that are within the range of the program's libraries. Accordingly, we inspect the content of the stack to see if a potential ROP attack exists and quarantine the damages for further security purposes. We have implemented a proof-of-concept system based on the open source Xen hypervisor. The evaluation results exhibit that our solution is effective and efficient.
Language: 英语
WOS ID: WOS:000325110400005
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/14768
Appears in Collections:信息安全国家重点实验室_期刊论文

Files in This Item:
File Name/ File Size Content Type Version Access License
bj01271972.pdf(1483KB)----限制开放 联系获取全文

Recommended Citation:
Xiaoqi Jia,Rui Wang,Jun Jiang,et al. Defending return-oriented programming based on virtualization techniques[J]. Security and Communication Networks,2013-10-01,Volume 6(Issue 10):1236-1249.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Xiaoqi Jia]'s Articles
[Rui Wang]'s Articles
[Jun Jiang]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Xiaoqi Jia]‘s Articles
[Rui Wang]‘s Articles
[Jun Jiang]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace