Abstract
In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of indirect system call entry points in operating system libraries is unique for each computer. Therefore, a piece of malware no longer works on several computers and becomes incompatible with their environment. We also present a concrete diversification tool and results on successful diversification. We conclude that despite some challenges, our tool can successfully diversify symbols in binaries and associated libraries in order to protect the system from attacks.
Original language | English |
---|---|
Title of host publication | 2014 World Congress on Internet Security, WorldCIS 2014 |
Publisher | IEEE |
Pages | 74-79 |
Number of pages | 6 |
ISBN (Electronic) | 9781908320421 |
DOIs | |
Publication status | Published - 30 Jan 2014 |
Publication type | A4 Article in conference proceedings |
Event | 2014 World Congress on Internet Security, WorldCIS 2014 - London, United Kingdom Duration: 8 Dec 2014 → 10 Dec 2014 |
Conference
Conference | 2014 World Congress on Internet Security, WorldCIS 2014 |
---|---|
Country/Territory | United Kingdom |
City | London |
Period | 8/12/14 → 10/12/14 |
ASJC Scopus subject areas
- Computer Networks and Communications
- Software