{"title":"A synergistic security method for control-flow hijacking detection using SPNs","authors":"Anna Trikalinou, N. Bourbakis","doi":"10.1109/IISA.2013.6623730","DOIUrl":null,"url":null,"abstract":"In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IISA 2013","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IISA.2013.6623730","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.