Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs

Yong Wang, Ming Li*, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Memory corruption bugs are one of the most critical vulnerabilities in software security, which can be exploited to overwrite virtual tables (vtables) or virtual table pointers (vfptrs) and finally gain control over the programs at virtual function call sites (vtable hijacking). In this paper, we propose a novel approach to detect vtable hijacking attacks against C++ binary executables. We first analyze the programs to get vtable information of each class, and backup the original vtables and vfptrs at runtime, then instrument security checks dynamically before virtual function dispatches to validate vtables' integrity. We implement the proposed approach as a tool and use it to successfully detect vtable hijacking attacks on the version 11 of Microsoft's Internet Explorer.

Original languageEnglish
Title of host publicationProceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
EditorsFabrizio Messina, Fatos Xhafa, Marek R. Ogiela, Leonard Barolli
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages430-434
Number of pages5
ISBN (Electronic)9781467394734
DOIs
Publication statusPublished - 2015
Event10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015 - Krakow, Poland
Duration: 4 Nov 20156 Nov 2015

Publication series

NameProceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015

Conference

Conference10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
Country/TerritoryPoland
CityKrakow
Period4/11/156/11/15

Keywords

  • C++ binary executable
  • Internet Explorer
  • dynamic binary instrumentation
  • virtual function table hijacking

Fingerprint

Dive into the research topics of 'Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs'. Together they form a unique fingerprint.

Cite this