Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution

نویسندگان

  • Georgios Portokalidis
  • Angelos D. Keromytis
چکیده

Instruction-set randomization (ISR) obfuscates the “language” understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim’s filesystem and successfully launch them, bypassing most mechanisms proposed to counter buffer overflows. We propose the holistic adoption of ISR across the software stack, preventing the execution of unauthorized binaries and scripts regardless of their origin. Our approach requires that programs be randomized with different keys during a user-controlled installation, effectively combining the benefits of code whitelisting/signing and runtime program integrity. We discuss how an ISR-enabled environment for binaries can be implemented with little overhead in hardware, and show that higher-overhead softwareonly alternatives are possible. We use Perl and SQL to demonstrate the application of ISR in scripting environments with negligible overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genome-Wide Characterization of ISR Induced in Arabidopsis thaliana by Trichoderma hamatum T382 Against Botrytis cinerea Infection

In this study, the molecular basis of the induced systemic resistance (ISR) in Arabidopsis thaliana by the biocontrol fungus Trichoderma hamatum T382 against the phytopathogen Botrytis cinerea B05-10 was unraveled by microarray analysis both before (ISR-prime) and after (ISR-boost) additional pathogen inoculation. The observed high numbers of differentially expressed genes allowed us to classif...

متن کامل

Execution Integrity with In-Place Encryption

Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, we show that ISR can be extended to also protect...

متن کامل

Where's the FEEB? The Effectiveness of Instruction Set Randomization

Instruction Set Randomization (ISR) has been proposed as a promising defense against code injection attacks. It defuses all standard code injection attacks since the attacker does not know the instruction set of the target machine. A motivated attacker, however, may be able to circumvent ISR by determining the randomization key. In this paper, we investigate the possibility of a remote attacker...

متن کامل

Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection

We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...

متن کامل

Phenylacetic Acid Is ISR Determinant Produced by Bacillus fortis IAGS162, Which Involves Extensive Re-modulation in Metabolomics of Tomato to Protect against Fusarium Wilt

Bacillus fortis IAGS162 has been previously shown to induce systemic resistance in tomato plants against Fusarium wilt disease. In the first phase of current study, the ISR determinant was isolated from extracellular metabolites of this bacterium. ISR bioassays combined with solvent extraction, column chromatography and GC/MS analysis proved that phenylacetic acid (PAA) was the potential ISR de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011