Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Constraint-based Diversification of JOP Gadgets
by
Tsoupidi, Rodothea Myrsini
, Baudry, Benoit
, Castañeda Lozano, Roberto
in
Application programs
/ Application specific
/ Artificial intelligence
/ Assembly
/ Assembly code
/ Binary programs
/ Code versions
/ Codes (symbols)
/ Compilers
/ Computer software reusability
/ Constraint programming
/ Constraint theory
/ Constraint-based
/ Constraints
/ Deployment process
/ Distance measure
/ Diversification
/ Economic and social effects
/ Embedded systems
/ Large neighbourhood searches
/ Large-scales
/ Optimal systems
/ Optimization
/ Program compilers
/ Quality control
/ Resilience
/ Security
/ Software
/ Software deployment
2021
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Constraint-based Diversification of JOP Gadgets
by
Tsoupidi, Rodothea Myrsini
, Baudry, Benoit
, Castañeda Lozano, Roberto
in
Application programs
/ Application specific
/ Artificial intelligence
/ Assembly
/ Assembly code
/ Binary programs
/ Code versions
/ Codes (symbols)
/ Compilers
/ Computer software reusability
/ Constraint programming
/ Constraint theory
/ Constraint-based
/ Constraints
/ Deployment process
/ Distance measure
/ Diversification
/ Economic and social effects
/ Embedded systems
/ Large neighbourhood searches
/ Large-scales
/ Optimal systems
/ Optimization
/ Program compilers
/ Quality control
/ Resilience
/ Security
/ Software
/ Software deployment
2021
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Constraint-based Diversification of JOP Gadgets
by
Tsoupidi, Rodothea Myrsini
, Baudry, Benoit
, Castañeda Lozano, Roberto
in
Application programs
/ Application specific
/ Artificial intelligence
/ Assembly
/ Assembly code
/ Binary programs
/ Code versions
/ Codes (symbols)
/ Compilers
/ Computer software reusability
/ Constraint programming
/ Constraint theory
/ Constraint-based
/ Constraints
/ Deployment process
/ Distance measure
/ Diversification
/ Economic and social effects
/ Embedded systems
/ Large neighbourhood searches
/ Large-scales
/ Optimal systems
/ Optimization
/ Program compilers
/ Quality control
/ Resilience
/ Security
/ Software
/ Software deployment
2021
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Constraint-based Diversification of JOP Gadgets
2021
Request Book From Autostore
and Choose the Collection Method
Overview
Modern software deployment process produces software that is uniform, and hence vulnerable to large-scale code-reuse attacks, such as Jump-Oriented Programming (JOP) attacks. Compiler-based diversification improves the resilience and security of software systems by automatically generating different assembly code versions of a given program. Existing techniques are efficient but do not have a precise control over the quality, such as the code size or speed, of the generated code variants. This paper introduces Diversity by Construction (DivCon), a constraint-based compiler approach to software diversification. Unlike previous approaches, DivCon allows users to control and adjust the conflicting goals of diversity and code quality. A key enabler is the use of Large Neighborhood Search (LNS) to generate highly diverse assembly code efficiently. For larger problems, we propose a combination of LNS with a structural decomposition of the problem. To further improve the diversification efficiency of DivCon against JOP attacks, we propose an application-specific distance measure tailored to the characteristics of JOP attacks. We evaluate DivCon with 20 functions from a popular benchmark suite for embedded systems. These experiments show that DivCon's combination of LNS and our application-specific distance measure generates binary programs that are highly resilient against JOP attacks (they share between 0.15% to 8% of JOP gadgets) with an optimality gap of 10%. Our results confirm that there is a trade-off between the quality of each assembly code version and the diversity of the entire pool of versions. In particular, the experiments show that DivCon is able to generate binary programs that share a very small number of gadgets, while delivering near-optimal code. For constraint programming researchers and practitioners, this paper demonstrates that LNS is a valuable technique for finding diverse solutions. For security researchers and software engineers, DivCon extends the scope of compiler-based diversification to performance-critical and resource-constrained applications.
Publisher
AI Access Foundation
Subject
This website uses cookies to ensure you get the best experience on our website.