作者: Felix C. Freiling , Ralf Hund , Thorsten Holz
DOI:
关键词: Protection mechanism 、 Computer security 、 Software portability 、 Computer science 、 Return-oriented programming 、 Rootkit
摘要: Protecting the kernel of an operating system against attacks, especially injection malicious code, is important factor for implementing secure systems. Several integrity protection mechanism were proposed recently that all have a particular shortcoming: They cannot protect attacks in which attacker re-uses existing code within to perform computations. In this paper, we present design and implementation fully automates process constructing instruction sequences can be used by We evaluate on different commodity systems show portability universality our approach. Finally, describe practical attack bypass mechanisms.