The Community for Technology Leaders
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2017)
Denver, CO, United States
June 26, 2017 to June 29, 2017
ISSN: 2158-3927
ISBN: 978-1-5386-0542-4
pp: 559-566
ABSTRACT
To quickly patch security vulnerabilities there has been keen interest in securing binaries in situ. Unfortunately, the state of the art in static binary rewriting does not allow the transformed program to be both space and time efficient. A primary limitation is that leading static rewriters require that the original copy of the code remains in the transformed binary, thereby incurring file size overhead of at least 100%. This paper presents Zipr, a static binary rewriter that removes this limitation and enables both space and time efficient transformation of arbitrary binaries. We describe results from applying Zipr in the DARPA Cyber Grand Challenge (CGC), the first fully automated cyber-hacking contest. The CGC rules penalized competitors for producing a patched binary whose on-disk size was 20% larger than the original, whose CPU utilization was 5% more than the original, and whose memory use was 5% more than the original. Zipr's efficiency enabled our automated system, Xandra, to apply both code diversity and control flow integrity security techniques to secure challenge binaries provided by DARPA, resulting in Xandra having the best security score in the competition, remaining within the required space and time performance envelope, and winning a $1M cash prize.
INDEX TERMS
Security, Tools, Libraries, Software, Runtime, Transforms, Binary codes
CITATION

W. H. Hawkins, J. D. Hiser, M. Co, A. Nguyen-Tuong and J. W. Davidson, "Zipr: Efficient Static Binary Rewriting for Security," 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, United States, 2017, pp. 559-566.
doi:10.1109/DSN.2017.27
547 ms
(Ver 3.3 (11022016))