Tampere University of Technology

TUTCRIS Research Portal

Symbol diversification of linux binaries

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Standard

Symbol diversification of linux binaries. / Lauren, Samuel; Maki, Petteri; Rauti, Sampsa; Hosseinzadeh, Shohreh; Hyrynsalmi, Sami; Leppanen, Ville.

2014 World Congress on Internet Security, WorldCIS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 74-79.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Harvard

Lauren, S, Maki, P, Rauti, S, Hosseinzadeh, S, Hyrynsalmi, S & Leppanen, V 2014, Symbol diversification of linux binaries. in 2014 World Congress on Internet Security, WorldCIS 2014. Institute of Electrical and Electronics Engineers Inc., pp. 74-79, 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, 8/12/14. https://doi.org/10.1109/WorldCIS.2014.7028170

APA

Lauren, S., Maki, P., Rauti, S., Hosseinzadeh, S., Hyrynsalmi, S., & Leppanen, V. (2014). Symbol diversification of linux binaries. In 2014 World Congress on Internet Security, WorldCIS 2014 (pp. 74-79). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WorldCIS.2014.7028170

Vancouver

Lauren S, Maki P, Rauti S, Hosseinzadeh S, Hyrynsalmi S, Leppanen V. Symbol diversification of linux binaries. In 2014 World Congress on Internet Security, WorldCIS 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 74-79 https://doi.org/10.1109/WorldCIS.2014.7028170

Author

Lauren, Samuel ; Maki, Petteri ; Rauti, Sampsa ; Hosseinzadeh, Shohreh ; Hyrynsalmi, Sami ; Leppanen, Ville. / Symbol diversification of linux binaries. 2014 World Congress on Internet Security, WorldCIS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 74-79

Bibtex - Download

@inproceedings{03ffa8ccff3149a6ba03690a604eb9d9,
title = "Symbol diversification of linux binaries",
abstract = "In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of indirect system call entry points in operating system libraries is unique for each computer. Therefore, a piece of malware no longer works on several computers and becomes incompatible with their environment. We also present a concrete diversification tool and results on successful diversification. We conclude that despite some challenges, our tool can successfully diversify symbols in binaries and associated libraries in order to protect the system from attacks.",
author = "Samuel Lauren and Petteri Maki and Sampsa Rauti and Shohreh Hosseinzadeh and Sami Hyrynsalmi and Ville Leppanen",
year = "2014",
month = "1",
day = "30",
doi = "10.1109/WorldCIS.2014.7028170",
language = "English",
pages = "74--79",
booktitle = "2014 World Congress on Internet Security, WorldCIS 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

RIS (suitable for import to EndNote) - Download

TY - GEN

T1 - Symbol diversification of linux binaries

AU - Lauren, Samuel

AU - Maki, Petteri

AU - Rauti, Sampsa

AU - Hosseinzadeh, Shohreh

AU - Hyrynsalmi, Sami

AU - Leppanen, Ville

PY - 2014/1/30

Y1 - 2014/1/30

N2 - In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of indirect system call entry points in operating system libraries is unique for each computer. Therefore, a piece of malware no longer works on several computers and becomes incompatible with their environment. We also present a concrete diversification tool and results on successful diversification. We conclude that despite some challenges, our tool can successfully diversify symbols in binaries and associated libraries in order to protect the system from attacks.

AB - In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of indirect system call entry points in operating system libraries is unique for each computer. Therefore, a piece of malware no longer works on several computers and becomes incompatible with their environment. We also present a concrete diversification tool and results on successful diversification. We conclude that despite some challenges, our tool can successfully diversify symbols in binaries and associated libraries in order to protect the system from attacks.

U2 - 10.1109/WorldCIS.2014.7028170

DO - 10.1109/WorldCIS.2014.7028170

M3 - Conference contribution

SP - 74

EP - 79

BT - 2014 World Congress on Internet Security, WorldCIS 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -