Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/16121
DC Field | Value | |
---|---|---|
dc.title | Runtime binary analysis for security | |
dc.contributor.author | SARAVANAN SINNADURAI S/O GUNACHILAN | |
dc.date.accessioned | 2010-04-08T11:01:18Z | |
dc.date.available | 2010-04-08T11:01:18Z | |
dc.date.issued | 2007-05-30 | |
dc.identifier.citation | SARAVANAN SINNADURAI S/O GUNACHILAN (2007-05-30). Runtime binary analysis for security. ScholarBank@NUS Repository. | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/16121 | |
dc.description.abstract | Exploitation of buffer overflow vulnerabilities constitutes a significant portion of security attacks in computer systems. Common buffer overflow attacks include return address attacks, format string attacks, vulnerable C function attacks, stack-smashing attacks, heap overflows and global offset table (GOT) modifications. The aim of these attacks is typically to hijack critical information in the process address space so as to redirect the programa??s control flow to any malicious code injected into the process memory. Previous solutions to these problems are based either on hardware or compiler. The former requires special hardware while the latter requires the source code of the application.In this thesis, I will be introducing Transparent RUntime Security Suite (TRUSS) that protects against common buffer overflow attacks. The scheme is implemented using DynamoRIO, a dynamic binary rewriting framework.DynamoRIO is implemented on both Windows and Linux. Hence, this scheme is able to protect applications on both operating systems. TRUSS has been successfully tested on the SPECINT 2000 benchmark programs (on both Windows and Linux), on John Wilandera??s a??Dynamic testbed for twenty buffer overflow attacksa??, on the a??Benchmark Suite for evaluating Architectural Security Systemsa?? as well as on Microsoft Access, PowerPoint, Excel and Word 2002. This thesis will discuss the implementation details of TRUSS. It also provides a performance evaluation, which will show that TRUSS is able to operate with an average overhead factor of up to 0.5 in Linux and 1.5 in Windows. Although implemented in DynamoRIO, the techniques employed in TRUSS are portable to other dynamic binary rewriting frameworks as well. | |
dc.language.iso | en | |
dc.subject | Runtime security, DynamoRIO | |
dc.type | Thesis | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.contributor.supervisor | WONG WENG FAI | |
dc.description.degree | Master's | |
dc.description.degreeconferred | MASTER OF SCIENCE | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Master's Theses (Open) |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
MSC THESIS - RUNTIME BINARY ANALYSIS FOR SECURITY.pdf | 411.89 kB | Adobe PDF | OPEN | None | View/Download |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.