Modelirovanie i Analiz Informatsionnykh Sistem
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Model. Anal. Inform. Sist.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Modelirovanie i Analiz Informatsionnykh Sistem, 2019, Volume 26, Number 2, Pages 213–228
DOI: https://doi.org/10.18255/1818-1015-213-228
(Mi mais674)
 

This article is cited in 3 scientific papers (total in 3 papers)

Theory of data

About detection of code reuse attacks

Yu. V. Kosolapov

Southern Federal University, 8a Milchakova str., Rostov-on-Don 344090, Russia
Full-text PDF (799 kB) Citations (3)
References:
Abstract: When exploiting software vulnerabilities such as buffer overflows, code reuse techniques are often used today. Such attacks allow you to bypass the protection against the execution of code in the stack, which is implemented at the software and hardware level in modern information systems. At the heart of these attacks lies the detection, in the vulnerable program of suitable areas, of executable code — gadgets — and chaining these gadgets into chains. The article proposes a way to protect applications from attacks that use code reuse. For this purpose, features that distinguish the chains of gadgets from typical chains of legal basic blocks of the program are highlighted. The appearance of an atypical chain of the base block during program execution may indicate the execution of a malicious code. An algorithm for identifying atypical chains has been developed. A feature of the algorithm is that it is focused on identifying all currently known techniques of re-execution of the code. The developed algorithm is based on a modified QEMU virtualization system. One of the hallmarks of the chain of gadgets is the execution at the end of the chain of instructions of the processor used to call the function of the operating system. For the Linux operating system based on the x86/64 architecture, experiments have been conducted showing the importance of this feature in detecting the execution of the malicious code.
Keywords: code reuse, software vulnerability.
Received: 17.12.2018
Revised: 13.05.2019
Accepted: 15.05.2019
Document Type: Article
UDC: 517.9
Language: Russian
Citation: Yu. V. Kosolapov, “About detection of code reuse attacks”, Model. Anal. Inform. Sist., 26:2 (2019), 213–228
Citation in format AMSBIB
\Bibitem{Kos19}
\by Yu.~V.~Kosolapov
\paper About detection of code reuse attacks
\jour Model. Anal. Inform. Sist.
\yr 2019
\vol 26
\issue 2
\pages 213--228
\mathnet{http://mi.mathnet.ru/mais674}
\crossref{https://doi.org/10.18255/1818-1015-213-228}
Linking options:
  • https://www.mathnet.ru/eng/mais674
  • https://www.mathnet.ru/eng/mais/v26/i2/p213
  • This publication is cited in the following 3 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Моделирование и анализ информационных систем
    Statistics & downloads:
    Abstract page:441
    Full-text PDF :166
    References:26
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024