Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2420995
|View full text |Cite
|
Sign up to set email alerts
|

Securing untrusted code via compiler-agnostic binary rewriting

Abstract: Binary code from untrusted sources remains one of the primary vehicles for malicious software attacks. This paper presents REINS, a new, more general, and lighter-weight binary rewriting and inlining system to tame and secure untrusted binary programs. Unlike traditional monitors, REINS requires no cooperation from codeproducers in the form of source code or debugging symbols, requires no client-side support infrastructure (e.g., a virtual machine or hypervisor), and preserves the behavior of even complex, eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(38 citation statements)
references
References 26 publications
0
38
0
Order By: Relevance
“…Richard et al [1] proposed a code rewrite and in-lining system (REINS) method to protect the code from malicious software attacks of untrusted sources. It's a software-based approach to detect attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Richard et al [1] proposed a code rewrite and in-lining system (REINS) method to protect the code from malicious software attacks of untrusted sources. It's a software-based approach to detect attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Zipr addresses many of the problems suffered by existing static binary rewriters such as high space overhead (as much as 2X), the inability to translate arbitrarily compiled programs (such as code compiled to be position independent), high runtime overhead, and requiring additional compiler information which may not be available [2,6,15,23,28,30,32,33,37].…”
Section: Ziprmentioning
confidence: 99%
“…Other post link time rewriters like REINS [50] and the tool by Zhang and Sekar [53] suffer from similar drawbacks as SecondWrite, in that their handling of indirect control flow and memory accesses also inflates the executable size even before any actual code hardening has been applied.…”
Section: Post Link-time Binary Rewritingmentioning
confidence: 99%
“…All post-link-time rewriter developers target and evaluate desktop computers and applications [40,45,3,53,50], where code size and file size are not really concerns. Furthermore, with desktop operating systems, all rewritten code can simply be reallocated contiguously in a completely different range of the address space.…”
Section: Post Link-time Binary Rewritingmentioning
confidence: 99%