Secure and Efficient In-Process Monitor and Multi-Variant Execution
dc.contributor.author | Yeoh, SengMing | en |
dc.contributor.committeechair | Ravindran, Binoy | en |
dc.contributor.committeemember | Wang, Haining | en |
dc.contributor.committeemember | Nikolaev, Ruslan | en |
dc.contributor.department | Electrical and Computer Engineering | en |
dc.date.accessioned | 2021-02-02T09:00:21Z | en |
dc.date.available | 2021-02-02T09:00:21Z | en |
dc.date.issued | 2021-02-01 | en |
dc.description.abstract | Control flow hijacking attacks such as Return Oriented Programming (ROP) and data oriented attacks like Data Oriented Programming (DOP) are problems still plaguing modern software today. While there have been many attempts at hardening software and protecting against these attacks, the heavy performance cost of running these defenses and intrusive modifications required has proven to be a barrier to adoption. In this work, we present Monguard, a high-performance hardware assisted in-process monitor protection system utilizing Intel Memory Protection Keys (MPK) to enforce execute-only memory, combined with code randomization and runtime binary patching to effectively protect and hide in-process monitors. Next, we introduce L-MVX, a flexible lightweight Multi-Variant Execution (MVX) system running in the in-process monitor system that aims to solve some of the performance problems of recent MVX defenses through selective program call graph protection and in-process monitoring, maintaining security guarantees either by breaking attacker assumptions or creating a scenario where a particular attack only works on a single variant. | en |
dc.description.abstractgeneral | Memory corruption attacks are still prevalent on modern software. While there have been many attempts at hardening software and preventing against these attacks, the heavy performance cost of running these defenses and intrusive modifications required have proven to be a barrier to adoption. In this work, we present L-MVX, a high-performance hardware assisted in-process monitor protection system that provides an unintrusive and efficient way to defend against these attacks on monitor systems. We also introduce L-MVX, a flexible lightweight process monitoring engine running on L-MVX that aims to solve some of the performance problems of recent monitor defenses. | en |
dc.description.degree | Master of Science | en |
dc.format.medium | ETD | en |
dc.identifier.other | vt_gsexam:28919 | en |
dc.identifier.uri | http://hdl.handle.net/10919/102158 | en |
dc.publisher | Virginia Tech | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Multi-Variant Execution | en |
dc.subject | In-Process Monitor | en |
dc.subject | Memory Isolation | en |
dc.title | Secure and Efficient In-Process Monitor and Multi-Variant Execution | en |
dc.type | Thesis | en |
thesis.degree.discipline | Computer Engineering | en |
thesis.degree.grantor | Virginia Polytechnic Institute and State University | en |
thesis.degree.level | masters | en |
thesis.degree.name | Master of Science | en |
Files
Original bundle
1 - 1 of 1