DocumentCode :
3757058
Title :
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs
Author :
Yong Wang;Ming Li;Hailin Yan;Zhenyan Liu;Jingfeng Xue;Changzhen Hu
Author_Institution :
Beijing Key Lab. of Software Security Eng. Technol., Beijing Inst. of Technol., Beijing, China
fYear :
2015
Firstpage :
430
Lastpage :
434
Abstract :
Memory corruption bugs are one of the most critical vulnerabilities in software security, which can be exploited to overwrite virtual tables (vtables) or virtual table pointers (vfptrs) and finally gain control over the programs at virtual function call sites (vtable hijacking). In this paper, we propose a novel approach to detect vtable hijacking attacks against C++ binary executables. We first analyze the programs to get vtable information of each class, and backup the original vtables and vfptrs at runtime, then instrument security checks dynamically before virtual function dispatches to validate vtables´ integrity. We implement the proposed approach as a tool and use it to successfully detect vtable hijacking attacks on the version 11 of Microsoft´s Internet Explorer.
Keywords :
"Instruments","Registers","Internet","Computer bugs","Security","Layout","Software"
Publisher :
ieee
Conference_Titel :
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015 10th International Conference on
Type :
conf
DOI :
10.1109/3PGCIC.2015.102
Filename :
7424602
Link To Document :
بازگشت