DocumentCode :
2166810
Title :
Transparent runtime randomization for security
Author :
Xu, Jun ; Kalbarczyk, Zbigniew ; Iyer, Ravishankar K.
Author_Institution :
Center for Reliable & High-Performance Comput., Univ. of Illinois, Urbana, IL, USA
fYear :
2003
fDate :
6-18 Oct. 2003
Firstpage :
260
Lastpage :
269
Abstract :
A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes transparent runtime randomization (TRR), a generalized approach for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program´s stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program´s memory layout different each time it runs foils the attacker´s assumptions about the memory layout of the vulnerable program and makes the determination of critical address values difficult if not impossible. TRR is implemented by changing the Linux dynamic program loader, hence it is transparent to applications. We demonstrate that TRR is effective in defeating real security attacks, including malloc-based heap overflow, integer overflow, and double-free attacks, for which effective prevention mechanisms are yet to emerge. Furthermore, TRR incurs less than 9% program startup overhead and no runtime overhead.
Keywords :
Unix; safety-critical software; TRR; application memory address space; attack prevention; dynamic program loader; security attacks; software implementation vulnerabilities; transparent runtime randomization; Buffer overflow; Computer bugs; Computer crime; Data security; Information security; Invasive software; Linux; Operating systems; Protection; Runtime;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliable Distributed Systems, 2003. Proceedings. 22nd International Symposium on
ISSN :
1060-9857
Print_ISBN :
0-7695-1955-5
Type :
conf
DOI :
10.1109/RELDIS.2003.1238076
Filename :
1238076
Link To Document :
بازگشت