Detect Compiler Inserted Run-time Security Checks in Binary Software

被引:0
|
作者
Pramanick, Koyel [1 ]
Kulkarni, Prasad A. [1 ]
机构
[1] Univ Kansas, EECS, Lawrence, KS 66045 USA
关键词
Program binary; Security check; Automated security assessment; GENERATION;
D O I
10.1007/978-3-031-21280-2_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our goal in this work is to develop a mechanism to determine the presence of targeted compiler-based or automated rules-based runtime security checks in any given binary. Our generalized approach relies on several key insights. First, instructions added by automated checks likely follow just one or only a few fixed patterns or templates at every insertion point. Second, any security check will guard some interesting or vulnerable program structure, like return addresses, indirect jumps/calls, etc., and the placement of the security check will inform about the nature of the check. By contrast, we would not expect ordinary user code to follow any single pattern at every such interesting program location. Our technique to detect automated security checks in binary code does not rely on known code signatures that can change depending on the language, the compiler, and the security check. We implement and evaluate our technique, and present our results, observations, and challenges in this work.
引用
收藏
页码:268 / 286
页数:19
相关论文
共 50 条
  • [31] Run-time security evaluation (RTSE) for distributed applications
    Serban, C
    McMillin, B
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 222 - 232
  • [32] A Run-Time Power Manager Exploiting Software Parallelism
    Holmbacka, Simon
    Lafond, Sebastien
    Lilius, Johan
    [J]. PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT'14), 2014, : 471 - 472
  • [33] RUN-TIME REVERSE ENGINEERING SPEEDS SOFTWARE TROUBLESHOOTING
    OBRIEN, C
    [J]. HIGH PERFORMANCE SYSTEMS-THE MAGAZINE FOR TECHNOLOGY CHAMPIONS, 1989, 10 (11): : 41 - &
  • [34] Run-time Selection of Security Algorithms For Networked Devices
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    [J]. Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 92 - 96
  • [35] Analysis and run-time verification of dynamic security policies
    Janicke, Helge
    Siewe, Frangois
    Jones, Kevin
    Cau, Antonio
    Zedan, Hussein
    [J]. DEFENCE APPLICATIONS OF MULTI-AGENT SYSTEMS, 2006, 3890 : 92 - 103
  • [36] SOFTWARE BASED METHODS TO HARDEN EMBEDDED SOFTWARE AT RUN-TIME: A SURVEY
    Kramer, Michael
    Horauer, Martin
    [J]. INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2015, VOL 9, 2016,
  • [37] ANALYSIS OF FUNCTIONAL PROGRAMS TO DETECT RUN-TIME GARBAGE CELLS
    INOUE, K
    SEKI, H
    YAGI, H
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1988, 10 (04): : 555 - 578
  • [38] A flexible strategy for embedding and configuring run-time contract checks in .net components
    Edwards, Stephen H.
    Haggard, Westley
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2007, 17 (03) : 315 - 338
  • [39] Improving compiler and run-time support for irregular reductions using local writes
    Han, HS
    Tseng, CW
    [J]. LANGUAGES AND COMPILERS FOR PARALLEL COMPUTING, 1999, 1656 : 181 - 196
  • [40] Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
    Anagnostopoulos, Nikolaos Athanasios
    Arul, Tolga
    Fan, Yufan
    Hatzfeld, Christian
    Schaller, Andre
    Xiong, Wenjie
    Jain, Manishkumar
    Saleem, Muhammad Umair
    Lotichius, Jan
    Gabmeyer, Sebastian
    Szefer, Jakub
    Katzenbeisser, Stefan
    [J]. CRYPTOGRAPHY, 2018, 2 (03) : 1 - 45