TY - JOUR
T1 - Research on the defense method of vtable hijacking
AU - Zixiang, Wang
AU - Chun, Shan
AU - Jingfeng, Xue
AU - Changzhen, Sun Shiyouhu
N1 - Publisher Copyright:
© 2016 SERSC.
PY - 2016
Y1 - 2016
N2 - Memory corruption vulnerability is an oldest type of vulnerabilities in software vulnerabilities. Attackers typically use a technique called virtual function table hijacking to exploit memory corruption vulnerability. In this paper, we propose a defense method which extracting virtual function tables and virtual function call related location information from the binary program. Then instrumenting identifier on vtables or backuping the vtables' pointers to detect vtables' integrity. Finally, the defense method is verified by Firefox, Chrome, IE browsers. Experiments show that the method can fully and effectively defend the real-world virtual function table hijacking attack with the small performance overhead and good compatibility.
AB - Memory corruption vulnerability is an oldest type of vulnerabilities in software vulnerabilities. Attackers typically use a technique called virtual function table hijacking to exploit memory corruption vulnerability. In this paper, we propose a defense method which extracting virtual function tables and virtual function call related location information from the binary program. Then instrumenting identifier on vtables or backuping the vtables' pointers to detect vtables' integrity. Finally, the defense method is verified by Firefox, Chrome, IE browsers. Experiments show that the method can fully and effectively defend the real-world virtual function table hijacking attack with the small performance overhead and good compatibility.
KW - Memory corruption vulnerability
KW - Software security
KW - Virtual function table hijacking attack
UR - http://www.scopus.com/inward/record.url?scp=85018212534&partnerID=8YFLogxK
U2 - 10.14257/ijsia.2016.10.11.22
DO - 10.14257/ijsia.2016.10.11.22
M3 - Article
AN - SCOPUS:85018212534
SN - 1738-9976
VL - 10
SP - 267
EP - 280
JO - International Journal of Security and its Applications
JF - International Journal of Security and its Applications
IS - 11
ER -