Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs

Yong Wang, Ming Li*, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Memory corruption bugs are one of the most critical vulnerabilities in software security, which can be exploited to overwrite virtual tables (vtables) or virtual table pointers (vfptrs) and finally gain control over the programs at virtual function call sites (vtable hijacking). In this paper, we propose a novel approach to detect vtable hijacking attacks against C++ binary executables. We first analyze the programs to get vtable information of each class, and backup the original vtables and vfptrs at runtime, then instrument security checks dynamically before virtual function dispatches to validate vtables' integrity. We implement the proposed approach as a tool and use it to successfully detect vtable hijacking attacks on the version 11 of Microsoft's Internet Explorer.

源语言英语
主期刊名Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
编辑Fabrizio Messina, Fatos Xhafa, Marek R. Ogiela, Leonard Barolli
出版商Institute of Electrical and Electronics Engineers Inc.
430-434
页数5
ISBN(电子版)9781467394734
DOI
出版状态已出版 - 2015
活动10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015 - Krakow, 波兰
期限: 4 11月 20156 11月 2015

出版系列

姓名Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015

会议

会议10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015
国家/地区波兰
Krakow
时期4/11/156/11/15

指纹

探究 'Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs' 的科研主题。它们共同构成独一无二的指纹。

引用此