TUM Logo

Retrospective Protection utilizing Binary Rewriting

Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and compile-time security hardening measures have been introduced. Unfortunately, these are not always part of the shipped object code. We present de sign and implementation of BinProtect, a binary rewriting tool, capable of retrospectively protecting binaries, which have not been sufficiently secured at compile-time. To achieve this, we do not need source code or any additional information

Retrospective Protection utilizing Binary Rewriting

14. Deutscher IT-Sicherheitskongress

Authors: Sergej Proskurin, Fatih Kilic, and Claudia Eckert
Year/month: 2015/5
Booktitle: 14. Deutscher IT-Sicherheitskongress
Fulltext: BinProtect2.pdf

Abstract

Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and compile-time security hardening measures have been introduced. Unfortunately, these are not always part of the shipped object code. We present de sign and implementation of BinProtect, a binary rewriting tool, capable of retrospectively protecting binaries, which have not been sufficiently secured at compile-time. To achieve this, we do not need source code or any additional information

Bibtex:

@inproceedings { proskurin2015,
author = { Sergej Proskurin and Fatih Kilic and Claudia Eckert},
title = { Retrospective Protection utilizing Binary Rewriting },
year = { 2015 },
month = { May },
booktitle = { 14. Deutscher IT-Sicherheitskongress },
url = {https://www.sec.in.tum.de/i20/publications/retrospective-protection-utilizing-binary-rewriting/@@download/file/BinProtect2.pdf}
}