Research on the defense method of vtable hijacking

Wang Zixiang*, Shan Chun, Xue Jingfeng, Sun Shiyouhu Changzhen

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

1 引用 (Scopus)

摘要

Memory corruption vulnerability is an oldest type of vulnerabilities in software vulnerabilities. Attackers typically use a technique called virtual function table hijacking to exploit memory corruption vulnerability. In this paper, we propose a defense method which extracting virtual function tables and virtual function call related location information from the binary program. Then instrumenting identifier on vtables or backuping the vtables' pointers to detect vtables' integrity. Finally, the defense method is verified by Firefox, Chrome, IE browsers. Experiments show that the method can fully and effectively defend the real-world virtual function table hijacking attack with the small performance overhead and good compatibility.

源语言英语
页(从-至)267-280
页数14
期刊International Journal of Security and its Applications
10
11
DOI
出版状态已出版 - 2016

指纹

探究 'Research on the defense method of vtable hijacking' 的科研主题。它们共同构成独一无二的指纹。

引用此