2021
DOI: 10.1007/978-3-030-76384-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Functional Correctness of Code Diversification Techniques

Abstract: Code diversification techniques are popular code-reuse attacks defense. The majority of code diversification research focuses on analyzing non-functional properties, such as whether the technique improves security. This paper provides a methodology to verify functional equivalence between the original and a diversified binary. We present a formal notion of binary equivalence resilient to diversification. Moreover, an algorithm is presented that checks whether two binaries -one original and one diversified -sat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…The idea behind application program diversity is to design a compiler that can generate multiple functionally equivalent variants of programs that are internally different [39], this method can be used in many application programs such as WebAssembly [40], a run time portable diversification system was proposed by [41] that exploit multiple heterogeneous programming system to ensure diversity. Analysis of the correctness and equivalence of the diverse code was also studied by researchers who developed methods to find the correctness of the generated variants of the code [42].…”
Section: Application Level Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea behind application program diversity is to design a compiler that can generate multiple functionally equivalent variants of programs that are internally different [39], this method can be used in many application programs such as WebAssembly [40], a run time portable diversification system was proposed by [41] that exploit multiple heterogeneous programming system to ensure diversity. Analysis of the correctness and equivalence of the diverse code was also studied by researchers who developed methods to find the correctness of the generated variants of the code [42].…”
Section: Application Level Techniquesmentioning
confidence: 99%
“…Many research efforts have been devoted to developing efficient MTD mechanisms, architectures, and strategies. Existing efforts target specific technologies such as Cloud [43], Software Defined Networks (SDN) [42,[44][45][46], SCADA systems, and IoT [47]. Despite this diversity, most developed technologies share common procedural guidelines and stages.…”
Section: Motivationmentioning
confidence: 99%