作者: S. Nanda , Wei Li , Lap-Chung Lam , Tzi-cker Chiueh
DOI: 10.1109/CGO.2006.6
关键词:
摘要: The majority of security vulnerabilities published in the literature is due to software bugs. Many researchers have developed program transformation and analysis techniques automatically detect or eliminate such vulnerabilities. So far, most them cannot be applied commercially distributed applications on Windows/x86 platform, because it almost impossible disassemble a binary file with 100% accuracy coverage that platform. This paper presents design, implementation, evaluation instrumentation infrastructure for platform called BIRD (binary interpretation using runtime disassembly), which provides two services developers security-enhancing tools: converting code into assembly language instructions further analysis, inserting at specific places given without affecting its execution semantics. Instead requiring high-fidelity instruction set architectural emulator, combines static disassembly an on-demand dynamic approach guarantee each analyzed transformed before executed. It takes 12 student months develop first prototype, can successfully work all Microsoft office suite as well Internet explorer IIS Web server, including DLLs they use. Moreover, additional throughput penalty prototype production server Apache, IIS, BIND uniformly below 4%.