,Feedback control can make data structure layout randomization more cost-effective under zero-day at

来源 :网络空间安全科学与技术(英文版) | 被引量 : 0次 | 上传用户:xiaoyueban
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In the wake of the research community gaining deep understanding about control-hijacking attacks,data-oriented attacks have emerged.Among data-oriented attacks,data structure manipulation attack (DSMA) is a major category.Pioneering research was conducted and shows that DSMA is able to circumvent the most effective defenses against control-hijacking attacks — DEP,ASLR and CFI.Up to this day,only two defense techniques have demonstrated their effectiveness:Data Flow Integrity (DFI) and Data Structure Layout Randomization (DSLR).However,DFI has high performance overhead,and dynamic DSLR has two main limitations.L-1:Randomizing a large set of data structures will significantly affect the performance.L-2:To be practical,only a fixed sub-set of data structures are randomized.In the case that the data structures targeted by an attack are not covered,dynamic DSLR is essentially noneffective.To address these two limitations,we propose a novel technique,feedback-control-based adaptive DSLR and build a system named SALADSPlus.SALADSPlus seeks to optimize the trade-off between security and cost through feedback control.Using a novel feedback-control-based adaptive algorithm extended from the Upper Confidence Bound (UCB) algorithm,the defender (controller) uses the feedbacks (cost-effectiveness) from previous randomization cycles to adaptively choose the set of data structures to randomize (the next action).Different from dynamic DSLR,the set of randomized data structures are adaptively changed based on the feedbacks.To obtain the feedbacks,SALADSPlus inserts canary in each data structure at the time of compilation.We have implemented SALADSPlus based on gcc-4.5.0.Experimental results show that the runtime overheads are 1.8%,3.7%,and 5.3% when the randomization cycles are selected as 10s,5s,and 1 s respectively.
其他文献
在未来作战中,舰艇电子对抗作战将不可避免地面临复杂电磁环境;在分析复杂电磁环境对水面舰艇电子对抗装备作战影响的基础上,从技战术层面,提出适应复杂电磁环境的舰艇电子对
2006年9月22日,由中国建筑业协会智能建筑专业委员会和上海新启邦威电子有限公司在北京艾维克大厦联合举办了“网络化数字音频新技术与应用研讨会”。上海新启邦威电子有限
随着我国加入WTO,市场竞争日益激烈,陷入财务危机的企业数量急剧上升,企业抵抗风险的能力较弱。企业财务危机的产生也不是一朝一夕造成的,而是一个长期积累和逐步发展的过程
Blockchain technology ensures that data is tamper-proof,traceable,and trustworthy.This article introduces a well-known blockchain technology implementation—Hyp
莎士比亚说:书籍是全世界的营养品.生活里没有书籍,就好像没有阳光;智慧里没有书籍,就好像鸟儿没有翅膀.是啊,从我认字开始,我每天都在和书籍接触,小时候,爸爸总会在临睡前给
由于工作关系,笔者是不吝花钱购买新闻业务书籍的,不单自己常到书店买,朋友们出差也嘱托代买。故此,这类藏书日渐多起来。然而,这类书名目虽繁多,内容却颇多似曾相识。称“
写长篇小说需要有个入口处,我们写消息、通讯、特写、言论,同样也需要有个入口处。寻找和选择入口处,是采写新闻报道的一个回避不了的现实问题。第一,选妥入口处,新闻报道就
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator.Moreover,armoure
IP geolocation determines geographical location by the IP address of Inteet hosts.IP geolocation is widely used by target advertising,online fraud detection,cyb
近年来,中国的税收一直以大大高于GDP增长的高速度在增长,越来越多的人以此认为我国的宏观税负偏重。笔者结合多年的工作经验,通过税负理论分析,加强国际国内间比较,提出我国当前