{"title":"安全漏洞-从数据分析到保护机制","authors":"R. Iyer, Shuo Chen, Jun Xu, Z. Kalbarczyk","doi":"10.1109/WORDS.2003.1267548","DOIUrl":null,"url":null,"abstract":"This paper combines an analysis of data on security vulnerabilities (published in the Bugtraq database) and a focused source-code examination to (i) develop a finite state machine (FSM) model to depict and reason about security vulnerabilities and (ii) to extract characteristics shared by a large class of commonly seen vulnerabilities (e.g., integer overflow, heap overflow, format string, and stack buffer overflow). This information is used to devise Transparent Runtime Randomization (TRR), a generic, randomization-based technique for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program’s stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program’s memory layout different each time it runs foils the attacker’s assumptions about the memory layout of the vulnerable program and defeats potential attacks. TRR is implemented by changing the Linux dynamic program loader; hence, it is transparent to applications. TRR incurs less than 9% program startup overhead and no runtime overhead.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Security Vulnerabilities - From Data Analysis to Protection Mechanisms\",\"authors\":\"R. Iyer, Shuo Chen, Jun Xu, Z. Kalbarczyk\",\"doi\":\"10.1109/WORDS.2003.1267548\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper combines an analysis of data on security vulnerabilities (published in the Bugtraq database) and a focused source-code examination to (i) develop a finite state machine (FSM) model to depict and reason about security vulnerabilities and (ii) to extract characteristics shared by a large class of commonly seen vulnerabilities (e.g., integer overflow, heap overflow, format string, and stack buffer overflow). This information is used to devise Transparent Runtime Randomization (TRR), a generic, randomization-based technique for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program’s stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program’s memory layout different each time it runs foils the attacker’s assumptions about the memory layout of the vulnerable program and defeats potential attacks. TRR is implemented by changing the Linux dynamic program loader; hence, it is transparent to applications. TRR incurs less than 9% program startup overhead and no runtime overhead.\",\"PeriodicalId\":350761,\"journal\":{\"name\":\"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WORDS.2003.1267548\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WORDS.2003.1267548","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Vulnerabilities - From Data Analysis to Protection Mechanisms
This paper combines an analysis of data on security vulnerabilities (published in the Bugtraq database) and a focused source-code examination to (i) develop a finite state machine (FSM) model to depict and reason about security vulnerabilities and (ii) to extract characteristics shared by a large class of commonly seen vulnerabilities (e.g., integer overflow, heap overflow, format string, and stack buffer overflow). This information is used to devise Transparent Runtime Randomization (TRR), a generic, randomization-based technique for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program’s stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program’s memory layout different each time it runs foils the attacker’s assumptions about the memory layout of the vulnerable program and defeats potential attacks. TRR is implemented by changing the Linux dynamic program loader; hence, it is transparent to applications. TRR incurs less than 9% program startup overhead and no runtime overhead.