Retrospective Protection utilizing Binary Rewriting
Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and compile-time security hardening measures have been introduced. Unfortunately, these are not always part of the shipped object code. We present de sign and implementation of BinProtect, a binary rewriting tool, capable of retrospectively protecting binaries, which have not been sufficiently secured at compile-time. To achieve this, we do not need source code or any additional information
Retrospective Protection utilizing Binary Rewriting
14. Deutscher IT-Sicherheitskongress
Authors: | Sergej Proskurin, Fatih Kilic, and Claudia Eckert |
Year/month: | 2015/5 |
Booktitle: | 14. Deutscher IT-Sicherheitskongress |
Fulltext: | BinProtect2.pdf |
Abstract |
|
Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and compile-time security hardening measures have been introduced. Unfortunately, these are not always part of the shipped object code. We present de sign and implementation of BinProtect, a binary rewriting tool, capable of retrospectively protecting binaries, which have not been sufficiently secured at compile-time. To achieve this, we do not need source code or any additional information |
Bibtex:
@inproceedings { proskurin2015,author = { Sergej Proskurin and Fatih Kilic and Claudia Eckert},
title = { Retrospective Protection utilizing Binary Rewriting },
year = { 2015 },
month = { May },
booktitle = { 14. Deutscher IT-Sicherheitskongress },
url = {https://www.sec.in.tum.de/i20/publications/retrospective-protection-utilizing-binary-rewriting/@@download/file/BinProtect2.pdf}
}