2011
DOI: 10.1007/978-1-4614-0977-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution

Abstract: Abstract. Instruction-set randomization (ISR) obfuscates the "language" understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim's filesystem and successfully launch them, bypassing most mechanisms proposed to counter buffer overflows. We propose the holistic adoptio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 27 publications
0
16
0
Order By: Relevance
“…Most of the previous work focuses on specific aspects of system configuration, such as IP addresses [10,2,8], memory layouts [27,15], instruction sets [13,4], html keywords [28,7], SQL queries [5], database table keywords [7], etc. Recently a few comprehensive frameworks [20,14] have been proposed, but most are still conceptual and require significant theoretical and practical effort to bring them to fruition.…”
Section: Overview and Related Workmentioning
confidence: 99%
“…Most of the previous work focuses on specific aspects of system configuration, such as IP addresses [10,2,8], memory layouts [27,15], instruction sets [13,4], html keywords [28,7], SQL queries [5], database table keywords [7], etc. Recently a few comprehensive frameworks [20,14] have been proposed, but most are still conceptual and require significant theoretical and practical effort to bring them to fruition.…”
Section: Overview and Related Workmentioning
confidence: 99%
“…• What to move: 'What to move' refers to what system configuration attribute (i.e., attack surface) can be dynamically changed to confuse attackers. The example system or network attributes that can be changed include instruction sets [86,123], address space layouts [135], IP addresses [3,10,79,88,138], port numbers [97], proxies [83], virtual machines [165,20], operating systems [148], or software programs [76]. Table III summarizes the moving elements by MTD techniques in different system layers [4,69].…”
Section: B Key Design Principlesmentioning
confidence: 99%
“…Or, since, wisely in these troubled times, the code, with its run-time variables, is protected, e.g. by a moving target defense like [11]. We recall that these recent techniques aim on secure cloud software through secret randomization of the code and variables, blocking injections and reverse engineering.…”
Section: --7 -mentioning
confidence: 99%
“…Such hope was probably unreasonable in the past. The progress in secure software engineering, e.g., through the moving target defenses, [11], makes it henceforward rational.…”
Section: Introductionmentioning
confidence: 99%