Course Hero Logo

Runtime measure.docx - Run-Time Countermeasures Executable...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 2 out of 3 pages.

Run-Time CountermeasuresExecutable Space Protection –A lot of exploits build on injecting and executing malicious code• By separating the memory space of a process into executable and modifiable parts, codeinjection can be prevented. Limitation: cannot fully protect programs that create and executecode at runtime – NXU bitCounter-countermeasure Circumventing Executable Space Protection – The attacker can re-useexisting code from the memory space of the process for malicious purposes. The attacker hascontrol over the stack → attacker can set up parameters for the C library functionAddress Space Layout Randomization (ASLR) • randomly arrange the positions of theexecutable, the stack, and the heap in the process’s address space • may prevent return-to-libcattacks • most operating systems (e.g., Windows, Linux) implement some randomization •Counter-countermeasures • information leakage (e.g., print vulnerability) • random guessing.Information Leakage with printf Vulnerability. can be used to figure out the address of theexecutable can be used to figure out the address of the stack. Limitations of ASLR • stack andheap cannot be located at any address. Heap spraying • fills up the memory with a certainsequence of bytes.Secure Programming -Trade-off problem: secure programming can increase development time(and cost), and decrease the performance of the software product.Input Validation Approaches – Blacklist -list “known bad” inputs • do not allow inputs thatare on the blacklist. listing all bad inputs is difficult and error-prone • typically lower impact onusability. Whitelist - list “known good” inputs • allow only inputs that are on the whitelist.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Trombetta,Shattuck,Pai
Tags
Intrusion detection system

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture