2012 Seventh International Conference on Availability, Reliability and Security (2006)
Apr. 20, 2006 to Apr. 22, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ARES.2006.11
Bing Mao , Nanjing University, Nanjing, 210093, China
Zhiqiang Lin , Nanjing University, Nanjing, 210093, China
Li Xie , Nanjing University, Nanjing, 210093, China
Many security attacks are caused by software vulnerabilities such as buffer overflow. How to eliminate or mitigate these vulnerabilities, in particular with unstoppable software, is a great challenge for security researchers and practitioners. In this paper, we propose a practical framework to immunize software security vulnerabilities on the fly. We achieve the vulnerability immunization by using a security antibody, which can be implemented independently from the protected software and is used to defend against vulnerability exploitation attacks. And we employ in-core patching technique to attach the antibody quietly into running process, and hence we neither need to re-compile nor re-execute the protected software. The effectiveness of our framework depends on the effectiveness of the antibody that is implemented by redirecting flaw functions into secure ones. As a proof of concept, we have built a prototype and applied it to prevent the software from buffer overflow attacks. Preliminary experimental results show that our framework is practical and efficient for the dynamical immunization of software security vulnerabilities.
Bing Mao, Zhiqiang Lin, Li Xie, "A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities", 2012 Seventh International Conference on Availability, Reliability and Security, vol. 00, no. , pp. 348-357, 2006, doi:10.1109/ARES.2006.11