Research on the defense method of vtable hijacking

Wang Zixiang*, Shan Chun, Xue Jingfeng, Sun Shiyouhu Changzhen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Memory corruption vulnerability is an oldest type of vulnerabilities in software vulnerabilities. Attackers typically use a technique called virtual function table hijacking to exploit memory corruption vulnerability. In this paper, we propose a defense method which extracting virtual function tables and virtual function call related location information from the binary program. Then instrumenting identifier on vtables or backuping the vtables' pointers to detect vtables' integrity. Finally, the defense method is verified by Firefox, Chrome, IE browsers. Experiments show that the method can fully and effectively defend the real-world virtual function table hijacking attack with the small performance overhead and good compatibility.

Original languageEnglish
Pages (from-to)267-280
Number of pages14
JournalInternational Journal of Security and its Applications
Volume10
Issue number11
DOIs
Publication statusPublished - 2016

Keywords

  • Memory corruption vulnerability
  • Software security
  • Virtual function table hijacking attack

Fingerprint

Dive into the research topics of 'Research on the defense method of vtable hijacking'. Together they form a unique fingerprint.

Cite this