A practical method to confine sensitive API invocations on commodity hardware

Donghai Tian*, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

1 引用 (Scopus)

摘要

Control-flow hijacking attacks are a very dangerous threat to software security in that they can hijack the programs execution to execute malicious code. There have been many solutions proposed for countering these attacks, but majority of them suffer from the following limitations: (1) Some methods could be bypassed by advanced code reuse attacks; (2) Some methods will incur considerable performance cost; (3) Some methods need to modify the target program. To address these problems, we present APIdefender, a kernel-based solution to defeat control-flow attacks. Our method is compatible with the existing software and hardware. The basic idea of our approach is to confine the sensitive API invocations by comparing the invocation context with the baseline information that is obtained by offline analysis. To perform the run-time enforcement for the API invocations, we leverage some commodity hardware features. The experiments show that APIdefender can detect malicious API invocations effectively with a little performance overhead.

源语言英语
主期刊名Network and System Security - 11th International Conference, NSS 2017, Proceedings
编辑Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
出版商Springer Verlag
145-159
页数15
ISBN(印刷版)9783319647005
DOI
出版状态已出版 - 2017
活动11th International Conference on Network and System Security, NSS 2017 - Helsinki, 芬兰
期限: 21 8月 201723 8月 2017

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
10394 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议11th International Conference on Network and System Security, NSS 2017
国家/地区芬兰
Helsinki
时期21/08/1723/08/17

指纹

探究 'A practical method to confine sensitive API invocations on commodity hardware' 的科研主题。它们共同构成独一无二的指纹。

引用此