DocumentCode :
1882257
Title :
Securing applications with Dyninst
Author :
Reffett, Chris ; Fleck, Dan
Author_Institution :
George Mason Univ., Fairfax, VA, USA
fYear :
2015
fDate :
14-16 April 2015
Firstpage :
1
Lastpage :
6
Abstract :
While significant bodies of work exist for sandboxing potentially malicious software and for sanitizing input, there has been little investigation into using binary editing software to perform either of these tasks. However, because binary editors do not require source code and can modify the software, they can generate secure versions of arbitrary binaries and provide better control over the software than existing approaches. In this paper, we explore the application of the binary editing library Dyninst to both the sandboxing and sanitization problems. We also create a prototype of a more advanced graphical tool to perform these tasks. Finally, we lay the groundwork for more complex and functional tools to solve these problems.
Keywords :
program diagnostics; security of data; software libraries; Dyninst; arbitrary binaries; binary editing library; binary editing software; binary editors; graphical tool; input sanitization; malicious software; sandboxing; sanitization problems; secure versions; securing applications; Graphical user interfaces; Instruments; Libraries; Memory management; Monitoring; Runtime; Software; binary instrumentation; dyninst; input sanitization; sandboxing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-1736-5
Type :
conf
DOI :
10.1109/THS.2015.7225297
Filename :
7225297
Link To Document :
بازگشت