Retrospective Protection utilizing Binary Rewriting
Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and compile-time security hardening measures have been introduced. Unfortunately, these are not always part of the shipped object code. We present de sign and implementation of BinProtect, a binary rewriting tool, capable of retrospectively protecting binaries, which have not been sufficiently secured at compile-time. To achieve this, we do not need source code or any additional information
Retrospective Protection utilizing Binary Rewriting
14. Deutscher IT-Sicherheitskongress
| Authors: | Sergej Proskurin, Fatih Kilic, and Claudia Eckert |
| Year/month: | 2015/5 |
| Booktitle: | 14. Deutscher IT-Sicherheitskongress |
| Fulltext: | BinProtect2.pdf |
Abstract |
|
| Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and compile-time security hardening measures have been introduced. Unfortunately, these are not always part of the shipped object code. We present de sign and implementation of BinProtect, a binary rewriting tool, capable of retrospectively protecting binaries, which have not been sufficiently secured at compile-time. To achieve this, we do not need source code or any additional information | |
Bibtex:
@inproceedings { proskurin2015,author = { Sergej Proskurin and Fatih Kilic and Claudia Eckert},
title = { Retrospective Protection utilizing Binary Rewriting },
year = { 2015 },
month = { May },
booktitle = { 14. Deutscher IT-Sicherheitskongress },
url = {https://www.sec.in.tum.de/i20/publications/retrospective-protection-utilizing-binary-rewriting/@@download/file/BinProtect2.pdf}
}
