Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Building Secure Defenses Against Code-Reuse AttacksBuilding Code Randomization Defenses

Building Secure Defenses Against Code-Reuse Attacks: Building Code Randomization Defenses [The basic observation is that an adversary typically generates an attack vector and aims to simultaneously compromise as many systems as possible using the same attack vector (i.e., one attack payload). To mitigate this so-called ultimate attack, Cohen proposes to diversify a software program into multiple and different instances while each instance still covers the entire semantics of the root software program. The goal is to force the adversary to tailor a specific attack vector/payload for each software instance and computer system making the attack tremendously expensive.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Building Secure Defenses Against Code-Reuse AttacksBuilding Code Randomization Defenses

Loading next page...
 
/lp/springer-journals/building-secure-defenses-against-code-reuse-attacks-building-code-QFk1b3FMsK
Publisher
Springer International Publishing
Copyright
© The Author(s) 2015
ISBN
978-3-319-25544-6
Pages
55 –67
DOI
10.1007/978-3-319-25546-0_4
Publisher site
See Chapter on Publisher Site

Abstract

[The basic observation is that an adversary typically generates an attack vector and aims to simultaneously compromise as many systems as possible using the same attack vector (i.e., one attack payload). To mitigate this so-called ultimate attack, Cohen proposes to diversify a software program into multiple and different instances while each instance still covers the entire semantics of the root software program. The goal is to force the adversary to tailor a specific attack vector/payload for each software instance and computer system making the attack tremendously expensive.]

Published: Dec 8, 2015

Keywords: Code Randomization; Memory Page; Translation Lookaside Buffer; Software Diversity; Code Pointer

There are no references for this article.