Software security enhancing method based on binary rewrite and dynamic randomization

A dynamic randomization and software security technology, applied in computer security devices, instruments, electronic digital data processing, etc., can solve the problems of inability to defend against information leakage attacks, coarse randomization granularity, etc., to reduce the probability of successful attacks and randomize granularity. Refinement, randomization effect of entropy increase

Inactive Publication Date: 2016-02-17
NANJING UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] On the basis of the existing work, the purpose of the present invention is to: solve the problems in the existing address space randomization mechanism, such as coarse randomization granularity, randomi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security enhancing method based on binary rewrite and dynamic randomization
  • Software security enhancing method based on binary rewrite and dynamic randomization
  • Software security enhancing method based on binary rewrite and dynamic randomization

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0069] The following further describes the implementation of the software security enhancement method based on binary rewriting and dynamic randomization on the Intel-x86 architecture and the Linux system in conjunction with the relevant explanatory diagrams and specific embodiments of the present invention.

[0070] Step 1: Use the existing mature binary rewriting tool to reconstruct the ELF binary file that needs dynamic randomization into a format suitable for running under the dynamic randomization mechanism. The binary rewriting operation in the present invention mainly involves jump instructions and page end instructions in the ELF file code segment; jump instructions are divided into page jump instructions and page jump instructions according to needs, and the rewrite operation jumps between pages. The transfer instruction is replaced with a specific system call instruction sequence, and the corresponding system call instruction sequence is inserted before the instruction a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a software security enhancing method based on binary rewrite and dynamic randomization, comprising the following modules: 1) static binary rewrite; 2) double-level mapping, namely from a process logical page to a logical page and from the logical page to a physical page; 3) a dynamic randomization mechanism periodically randomizes a process address space by taking pages as granularities; 4) a logical address mapping redirecting mechanism provides the logical address mapping a redirecting service for a process. According to the software security enhancing method based on the binary rewrite and the dynamic randomization, the randomization entropy of the process address space is remarkably improved through the fine granularity dynamic cyclical randomization, the successful probability of attacking of an attacker is lowered, and the security of the a computer system and software is improved.

Description

technical field [0001] The invention belongs to the field of computer technology, especially the field of system and software safety. The invention provides a software security enhancement method combined with binary rewriting and dynamic randomization, which is used to improve the security of the operating system and application software. Background technique [0002] Computer technology has played a pivotal role in production and life, and it is becoming more and more important to ensure the security of computer systems and software. In the arms race of computer system and software security, the attacks that have appeared successively include: Buffer Overflow Attack, Code Injection Attack, Code Reuse Attack, Information Leakage Attack, etc.; Correspondingly, related defense mechanisms include: No-eXecute (NX), Address Space Layout Randomization (ASLR), etc. [0003] Buffer overflow attack: a widely used and seriously harmful attack method has become an important problem ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/033
Inventor 侯宇李永锋平丹陈平茅兵
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products