{"title":"增强Visual Studio C/ c++编译器的安全检查","authors":"Yongdong Wu","doi":"10.1109/WCSE.2009.44","DOIUrl":null,"url":null,"abstract":"Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"24 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Enhancing Security Check in Visual Studio C/C++ Compiler\",\"authors\":\"Yongdong Wu\",\"doi\":\"10.1109/WCSE.2009.44\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.\",\"PeriodicalId\":331155,\"journal\":{\"name\":\"2009 WRI World Congress on Software Engineering\",\"volume\":\"24 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 WRI World Congress on Software Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSE.2009.44\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 WRI World Congress on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSE.2009.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
摘要
缓冲区溢出利用是软件安全的主要威胁。为了减少这种威胁,Visual studio C/ c++编译器支持在初始化时对被编译程序的地址进行随机化,并在运行时由被编译程序嵌入安全堆栈保护。本文通过增加编译程序在以下方面的能力来升级编译器:(1)在不增加成本的情况下保护帧指针不被调用者篡改;(2)以极低的代价挫败篡改受保护区域1-2字节的攻击;(3)根据序段模式对间接函数调用进行检查,以减少软件被攻击时崩溃的概率。我们的实验证明了Microsoft Visual Studio在生成安全、健壮的软件方面的改进。
Enhancing Security Check in Visual Studio C/C++ Compiler
Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.