Publication:
Diversification of Stack Layout in Binary Programs Using Dynamic Binary Translation

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

University of Virginia, Department of Computer Science

Research Projects

Organizational Units

Journal Issue

Abstract

Despite protracted efforts by researchers and practitioners, security vulnerabilities remain in modern software. Artificial diversity is an effective defense against many types of attack, and one form, address-space randomization, has been widely applied. Present implementations of address- space randomization are either coarse grained or require source code. We present an approach to fine-grained randomization of the stack layout that operates on x86 binary programs. Randomization is applied on a function-by-function basis. Variable ordering on the stack is randomized and random-length padding inserted between variables. Optionally, canaries can be placed in the padding regions. Transform determination is speculative: the stack layout for a function is inferred from the binary, and then assessed by executing the transformed program. If a transform changes a program’s semantics, progressively less aggressive transforms are applied in sequence. We present results of applying the technique to various open-source programs including details of example exploits that the technique defeated.

Description

Original submission date: 2013-08-09T14:22:23Z

Subjects

Citation

Rodes, Benjamin, Anh Nguyen-Tuong, John Knight, James Shepherd, Jason Hiser, Michelle Co, and Jack Davidson. "Diversification of Stack Layout in Binary Programs Using Dynamic Binary Translation." University of Virginia Dept. of Computer Science Tech Report (2012).

Collections

Endorsement

Review

Supplemented By

Referenced By