作者: Matthias Neugschwandtner , Collin Mulliner , William Robertson , Engin Kirda
DOI: 10.1007/978-3-319-45572-3_4
关键词: Code injection 、 Source code 、 Reduced instruction set computing 、 Code reuse 、 Exploit 、 System call 、 Computer science 、 Embedded system 、 Executable 、 Emulation
摘要: Entering the age of Internet things, embedded devices are everywhere. They built using common hardware such as RISC-based ARM and MIPS platforms, lightweight open software components. Because their limited resources, systems often lack protection mechanisms that have been introduced to desktop server world. In this paper, we present BINtegrity, a novel approach for exploit mitigation is specifically tailored towards based on RISC architecture. BINtegrity leverages architectural features CPUs extract combination static dynamic properties relevant OS service requests from executables, enforces them during runtime. Our technique borrows ideas several areas including system call monitoring, analysis, code emulation, combines in low-overhead fashion directly operating kernel. We implemented Linux system. practical, restricts ability attackers generic memory corruption vulnerabilities COTS binaries. contrast other approaches, does not require access source code, binary modification, or application specific configuration policies. evaluation demonstrates incurs very low overhead – only 2 % whole performance, shows our mitigates both injection reuse attacks.