2010 Articles
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
Instruction-set randomization (ISR) obfuscates the "language" understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim’s filesystem and successfully launch them, bypassing most mechanisms proposed to counter buffer overflows. We propose the holistic adoption of ISR across the software stack, preventing the execution of unauthorized binaries and scripts regardless of their origin. Our approach requires that programs be randomized with different keys during a user-controlled installation, effectively combining the benefits of code whitelisting/signing and runtime program integrity. We discuss how an ISR-enabled environment for binaries can be implemented with little overhead in hardware, and show that higher-overhead software only alternatives are possible. We use Perl and SQL to demonstrate the application of ISR in scripting environments with negligible overhead.
Subjects
Files
- aro-isr.pdf application/pdf 310 KB Download File
Also Published In
- Title
- Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
- Publisher
- Springer
- DOI
- https://doi.org/10.1007/978-1-4614-0977-9_3
More About This Work
- Academic Units
- Computer Science
- Series
- Advances in Information Security, 54
- Published Here
- July 10, 2012