advances in information and computer security 6th international workshop, iwsec 2011, tokyo, japan, november 8-10, 2011 proceedings

244 576 0
advances in information and computer security 6th international workshop, iwsec 2011, tokyo, japan, november 8-10, 2011 proceedings

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... that necessitated the introduction of the RP) This is achieved by augmenting every memory write instruction within a RP with analysis code that appends an entry in a dynamically expanding array, which holds the address being written and the value being overwritten Because we are using Pin’s instrumentation versioning, only the instructions being reached from within a RP are actually instrumented this way... in receiving threads Since the code that the thread was executing may have already been instrumented, we first remove the code currently executing from the code cache After suppressing the delivery of the signal, Pin attempts to resume execution and since the block of code is no longer present in the code cache, our instrumentation routine is invoked again This allows us to install an analysis routine... which are expressed by continuous distribution, and presented a discrete version in an attempt to reduce the code length and the required memory amount without degrading the traceability T Iwata and M Nishigaki (Eds.): IWSEC 2011, LNCS 7038, pp 1–15, 2011 c Springer-Verlag Berlin Heidelberg 2011 2 M Kuribayashi It is reported in [2] that a correlation sum calculated in a tracing algorithm is expected... signals In Pin’s terms, it allows the instrumentation of the application Additionally, instrumentation routines can modify original code by removing instructions or by more frequently adding new code, referred to as analysis code The instrumented application executes on top of Pin’s virtual machine (VM) runtime, which essentially consists of a just -in- time (JIT) compiler that combines the original and. .. the other hand, the attack strategies are not limited to the above types in a realistic situation such that a codeword is binary and each bit is embedded A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes 5 into one of segments of a digital content without overlapping using a robust watermarking scheme It is reasonable to assume that each bit is embedded ˆ into a segment using an antipodal... actively developed and supports multiple hardware architectures and OSs Pintools can be applied on any supported binary by either launching the binary through Pin or by attaching on an already running binary The latter behavior is highly desirable for REASSURE, as it allows us to deploy RPs without interrupting an already executing application We implemented REASSURE as a Pintool on Linux, but it is by... for generating a RP when an unexpected error occurs, while the second is in charge of applying the produced RP on the application and recovering from future errors 2.1 What Is a Rescue Point? We define a rescue point as a function, preceding and encapsulating code suffering from an fault (i.e., the fault it aims to mend) that contains error handling code, which can be reused to gracefully handle the unexpected... Processing the dumped core can reveal the function containing the fault, which can be frequently used as a RP itself or assist the user to find a nearby RP fit to handle the error 20 G Portokalidis and A.D Keromytis 2.3 Rescue Point Deployment In ASSURE, RPs are deployed using two systems First, Dyninst [4] is employed to inject special code in the beginning of the corresponding function that checkpoints... Author Index 193 210 231 A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes Minoru Kuribayashi Graduate School of Engineering, Kobe University 1-1 Rokkodai-cho, Nada-ku, Kobe, Hyogo, 657-8501 Japan kminoru@kobe-u.ac.jp Abstract The performance of fingerprinting codes has been studied under the well-known marking assumption In a realistic... the Linux OS 3.2 Installing Rescue Points RPs can be installed on any callable application function Such a function can be identified by its name or its address The latter can be useful in cases where a binary has been entirely stripped of symbol information, and as such its functions are only identifiable by their address In systems where the targeted binary is stripped and address space layout randomization . Planck Institute for Informatics, Saarbruecken, Germany

Ngày đăng: 31/05/2014, 00:10

Từ khóa liên quan

Mục lục

  • Cover

  • Lecture Notes in Computer Science 7038

  • Advances in Information and Computer Security

  • ISBN 9783642251405

  • Preface

  • IWSEC 2011 6th International Workshop on Security

  • Table of Contents

  • Software Protection and Reliability

    • A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes

      • Introduction

      • Preliminaries

        • Probabilistic Fingerprinting Code

        • Attack Model

        • Conventional Tracing Algorithm

        • Proposed Tracing Algorithm

          • Channel Estimation

          • Correlation Score

          • Threshold

          • Equalization of Probability

          • Experimental Results

          • Conclusion

          • References

          • REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points

            • Introduction

            • Software Self-healing Using Rescue Points

              • What Is a Rescue Point?

Tài liệu cùng người dùng

Tài liệu liên quan