Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/ACSAC.2006.29guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Foreign Code Detection on the Windows/X86 Platform

Published: 11 December 2006 Publication History

Abstract

As new attacks againstWindows-based machines emerge almost on a daily basis, there is an increasing need to "lock down" individual users' desktop machines in corporate computing environments. One particular way to lock down a user computer is to guarantee that only authorized binary programs are allowed to run on that computer. A major advantage of this approach is that binaries downloaded without the user's knowledge, such as spyware, adware, or code entering through buffer overflow attacks, can never run on computers that are locked down this way. This paper presents the design, implementation and evaluation of FOOD, a foreign code detection system specifically for the Windows/X86 platform, where foreign code is defined as any binary programs that do not go through an authorized installation procedure. FOOD verifies the legitimacy of binary images involved in process creation and library loading to ensure that only authorized binaries are used in these operations. In addition, FOOD checks the target address of every indirect branch instruction in Windows binaries to prevent illegitimate control transfers to either dynamically injected mobile code or pre-existing library functions that are potentially damaging. Combined together, these techniques strictly prevent the execution of any foreign code. Experiments with a fully working FOOD prototype show that it can indeed stop all spyware and buffer overflow attacks we tested, and its worst-case run-time performance overhead associated with foreign code detection is less than 35%.

Cited By

View all
  • (2015)Control Flow and Code Integrity for COTS binariesProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818016(91-100)Online publication date: 7-Dec-2015
  • (2012)Runtime countermeasures for code injection attacks against C and C++ programsACM Computing Surveys10.1145/2187671.218767944:3(1-28)Online publication date: 14-Jun-2012
  • (2011)Towards a binary integrity system for windowsProceedings of the 6th ACM Symposium on Information, Computer and Communications Security10.1145/1966913.1966987(503-507)Online publication date: 22-Mar-2011

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference
December 2006
504 pages
ISBN:0769527167

Publisher

IEEE Computer Society

United States

Publication History

Published: 11 December 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Control Flow and Code Integrity for COTS binariesProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818016(91-100)Online publication date: 7-Dec-2015
  • (2012)Runtime countermeasures for code injection attacks against C and C++ programsACM Computing Surveys10.1145/2187671.218767944:3(1-28)Online publication date: 14-Jun-2012
  • (2011)Towards a binary integrity system for windowsProceedings of the 6th ACM Symposium on Information, Computer and Communications Security10.1145/1966913.1966987(503-507)Online publication date: 22-Mar-2011

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media