Title :
Securing applications with Dyninst
Author :
Reffett, Chris ; Fleck, Dan
Author_Institution :
George Mason Univ., Fairfax, VA, USA
Abstract :
While significant bodies of work exist for sandboxing potentially malicious software and for sanitizing input, there has been little investigation into using binary editing software to perform either of these tasks. However, because binary editors do not require source code and can modify the software, they can generate secure versions of arbitrary binaries and provide better control over the software than existing approaches. In this paper, we explore the application of the binary editing library Dyninst to both the sandboxing and sanitization problems. We also create a prototype of a more advanced graphical tool to perform these tasks. Finally, we lay the groundwork for more complex and functional tools to solve these problems.
Keywords :
program diagnostics; security of data; software libraries; Dyninst; arbitrary binaries; binary editing library; binary editing software; binary editors; graphical tool; input sanitization; malicious software; sandboxing; sanitization problems; secure versions; securing applications; Graphical user interfaces; Instruments; Libraries; Memory management; Monitoring; Runtime; Software; binary instrumentation; dyninst; input sanitization; sandboxing;
Conference_Titel :
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-1736-5
DOI :
10.1109/THS.2015.7225297