作者
Sameed Ali, Prashant Anantharaman, Sean W Smith
发表日期
2020/5/21
研讨会论文
2020 IEEE Security and Privacy Workshops (SPW)
页码范围
291-299
出版商
IEEE
简介
Vulnerabilities in third-party software modules have resulted in severe security flaws, including remote code execution and denial of service. However, current approaches to securing such libraries suffer from one of two problems. First, they do not perform sufficiently well to be applicable in practice and incur high CPU and memory overheads. Second, they are also harder to apply to legacy and proprietary systems when the source code of the application is not available. There is, therefore, a dire need to secure the internal boundaries within an application to ensure vulnerable software modules are not exploitable via crafted input attacks. We present a novel approach to secure third-party software modules without requiring access to the source code of the program. First, using the foundations of language-theoretic security, we build a validation filter for the vulnerable module. Using the foundations of linking and …
引用总数
2021202220232024111
学术搜索中的文章
S Ali, P Anantharaman, SW Smith - 2020 IEEE Security and Privacy Workshops (SPW), 2020