World Congress on Internet Security (WorldCIS-2014) 2014
DOI: 10.1109/worldcis.2014.7028170
|View full text |Cite
|
Sign up to set email alerts
|

Symbol diversification of linux binaries

Abstract: In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of indirect system call entry points in operating system libraries is unique for each computer.Therefore, a piece of malware no longer works on several computers and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Lauren et at. propose to diversify library entry points to system calls [14], [15]. Since entry points are unique in each computer, it becomes very difficult for malware to access system resources.…”
Section: B System Callsmentioning
confidence: 99%
“…Lauren et at. propose to diversify library entry points to system calls [14], [15]. Since entry points are unique in each computer, it becomes very difficult for malware to access system resources.…”
Section: B System Callsmentioning
confidence: 99%
“…Ergo, the malware that is not aware of the new system call numbers is unable to interact with the environment. Symbol diversification [18,19] diversifies the symbol names used with dynamic linking of shared libraries. Shared libraries implement functions that are used by other libraries or executables.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the changed names are propagated to all ELF files that depend on the entities whose symbolic names were diversified. To experiment with symbol diversification on Raspbian, we employed our old tool that was previously used to diversify x86_64 Linux [18]. To be run on Raspbian, the tool needed to be modified to support 32-bit ELF files, which was relatively straightforward.…”
Section: Symbol Diversification On Raspbianmentioning
confidence: 99%
See 1 more Smart Citation
“…Several diversification schemes employing this general idea have been published in the literature [4]. In the Linux operating system, these schemes often propose diversification of three important interfaces: (1) the system call interface [6]; (2) binary symbols and library functions [7]; and (3) command shell language [8,9]. In this study, our aim is to investigate the feasibility of each solution for system's multi-layered security.…”
Section: Introductionmentioning
confidence: 99%