binary programs
Recently Published Documents


TOTAL DOCUMENTS

63
(FIVE YEARS 16)

H-INDEX

11
(FIVE YEARS 1)

2021 ◽  
Vol 72 ◽  
pp. 1471-1505
Author(s):  
Rodothea Myrsini Tsoupidi ◽  
Roberto Castañeda Lozano ◽  
Benoit Baudry

Modern software deployment process produces software that is uniform, and hence vulnerable to large-scale code-reuse attacks, such as Jump-Oriented Programming (JOP) attacks. Compiler-based diversification improves the resilience and security of software systems by automatically generating different assembly code versions of a given program. Existing techniques are efficient but do not have a precise control over the quality, such as the code size or speed, of the generated code variants.  This paper introduces Diversity by Construction (DivCon), a constraint-based compiler approach to software diversification. Unlike previous approaches, DivCon allows users to control and adjust the conflicting goals of diversity and code quality. A key enabler is the use of Large Neighborhood Search (LNS) to generate highly diverse assembly code efficiently. For larger problems, we propose a combination of LNS with a structural decomposition  of the problem. To further improve the diversification efficiency of DivCon against JOP attacks, we propose an application-specific distance measure tailored to the characteristics of JOP attacks.  We evaluate DivCon with 20 functions from a popular benchmark suite for embedded systems. These experiments show that DivCon's combination of LNS and our application-specific distance measure generates binary programs that are highly resilient against JOP  attacks (they share between 0.15% to 8% of JOP gadgets) with an optimality gap of 10%. Our results confirm that there is a trade-off between the quality of each assembly code version and the diversity of the entire pool of versions. In particular, the experiments  show that DivCon is able to generate binary programs that share a very small number of  gadgets, while delivering near-optimal code.  For constraint programming researchers and practitioners, this paper demonstrates that LNS is a valuable technique for finding diverse solutions. For security researchers and software  engineers, DivCon extends the scope of compiler-based diversification to performance-critical and resource-constrained applications.  


2021 ◽  
Vol 18 (8) ◽  
pp. 1-16
Author(s):  
Wenjie Wang ◽  
Donghai Tian ◽  
Rui Ma ◽  
Hang Wei ◽  
Qianjin Ying ◽  
...  

Author(s):  
Takehiro Tsuzaki ◽  
Teruaki Yamamoto ◽  
Haruaki Tamada ◽  
Akito Monden

To detect the software theft, software birthmarks have been proposed. Software birthmark systems extract software birthmarks, which are native characteristics of software, from binary programs, and compare them by computing the similarity between birthmarks. This paper proposes a new procedure for scaling up the birthmark systems. While conventional birthmark systems are composed of the birthmark extraction phase and the birthmark comparison phase, the proposed method adds two new phases between extraction and comparison, namely, compression phase, which employs fuzzy hashing, and pre-comparison phase, which aims to increase distinction property of birthmarks. The proposed method enables us to reduce the required time in the comparison phase, so that it can be applied to detect software theft among many larger scale software products. From an experimental evaluation, the authors found that the proposed method significantly reduces the comparison time, and keeps the distinction performance, which is one of the important properties of the birthmark. Also, the preservation performance is acceptable when the threshold value is properly set.


Author(s):  
Yifei Xu ◽  
Zhengzi Xu ◽  
Bihuan Chen ◽  
Fu Song ◽  
Yang Liu ◽  
...  
Keyword(s):  

2020 ◽  
Vol 2020 ◽  
pp. 1-19 ◽  
Author(s):  
Jiaye Pan ◽  
Yi Zhuang ◽  
Binglin Sun

To protect core functions, applications often utilize the countermeasure techniques such as antidebugging to avoid analysis by outsiders, especially the malware. Dynamic binary instrumentation is commonly used in the analysis of binary programs. However, it can be easily detected and has stability and applicability problems as it involves program rewriting and just-in-time compilation. This paper proposes a new lightweight analysis method for binary programs with the assistance of hardware features and the operating system kernel, named BAHK, which can automatically analyze the target program by stealth and has wide applicability. With the support of underlying infrastructures, this paper designs several optimization strategies and specific analysis approaches at instruction level to reduce the impact of fine-grained analysis on the performance of target program so that it can be well applied in practice. The experimental results show that the proposed method has good stealthiness, low memory consumption, and positive user experience. In some cases, it shows better analysis performance than the traditional dynamic binary instrumentation method. Finally, the real case studies further show its feasibility and effectiveness.


2020 ◽  
pp. 1-12
Author(s):  
Yuwei Li ◽  
Shouling Ji ◽  
Chenyang Lyu ◽  
Yuan Chen ◽  
Jianhai Chen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document