RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine Instructions

Asanga Wanniarachchi, C. Gamage
{"title":"RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine Instructions","authors":"Asanga Wanniarachchi, C. Gamage","doi":"10.23919/ICACT.2019.8701914","DOIUrl":null,"url":null,"abstract":"Modern software systems have nearly an uncontrolled growth in complex requirements that is fueled by the need to interact with multiple other complex systems. While some of the complexity increases are due to activities such as bug fixes which are unavoidable, other activities such as expanding and enhancing functionality of a software system becomes a risky endeavor to undertake with respect to security as responding to the potential vulnerabilities due to complexity increases require scarce resources including technical expertise and time. This paper introduces RECSRF; a novel framework to quantitatively evaluate the security of an execution in line with the security risk impact it makes over the particular microprocessor on which it executes. RECSRF consists of two components; a novel concept called The Run-time Execution Complexity (REC) of a program execution, which evaluates the trade-off between performance vs. security, while adhering to Control Flow Integrity (CFI) of programs, and an information theoretic technique to approximate the Security Risk Factor (SRF), which approximates the risk of a particular execution by analyzing dynamically disassembled machine instructions of a particular microprocessor. The RECSRF value allows software designers to select the most secure resource combination among a given set of resources, and software implementers to decide whether to proceed or not with a software change. The method can also be used to detect control flow hijacks at runtime by using it as an application level intrusion detection mechanism which allows transforming the same to an application level intrusion preventer upon successful implementation.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 21st International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT.2019.8701914","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Modern software systems have nearly an uncontrolled growth in complex requirements that is fueled by the need to interact with multiple other complex systems. While some of the complexity increases are due to activities such as bug fixes which are unavoidable, other activities such as expanding and enhancing functionality of a software system becomes a risky endeavor to undertake with respect to security as responding to the potential vulnerabilities due to complexity increases require scarce resources including technical expertise and time. This paper introduces RECSRF; a novel framework to quantitatively evaluate the security of an execution in line with the security risk impact it makes over the particular microprocessor on which it executes. RECSRF consists of two components; a novel concept called The Run-time Execution Complexity (REC) of a program execution, which evaluates the trade-off between performance vs. security, while adhering to Control Flow Integrity (CFI) of programs, and an information theoretic technique to approximate the Security Risk Factor (SRF), which approximates the risk of a particular execution by analyzing dynamically disassembled machine instructions of a particular microprocessor. The RECSRF value allows software designers to select the most secure resource combination among a given set of resources, and software implementers to decide whether to proceed or not with a software change. The method can also be used to detect control flow hijacks at runtime by using it as an application level intrusion detection mechanism which allows transforming the same to an application level intrusion preventer upon successful implementation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于机器指令动态拆解的程序安全性评估新技术
由于需要与多个其他复杂系统进行交互,现代软件系统在复杂需求方面几乎有不受控制的增长。虽然一些复杂性的增加是由于诸如不可避免的错误修复之类的活动,但其他活动(例如扩展和增强软件系统的功能)在安全性方面变得有风险,因为响应由于复杂性增加而导致的潜在漏洞需要稀缺的资源,包括技术专长和时间。本文介绍了RECSRF;一种新的框架,根据执行对特定微处理器的安全风险影响来定量评估执行的安全性。RECSRF由两个部分组成;一个被称为程序执行的运行时执行复杂性(REC)的新概念,它评估性能与安全性之间的权衡,同时坚持程序的控制流完整性(CFI),以及一种近似安全风险系数(SRF)的信息理论技术,它通过分析特定微处理器的动态拆卸机器指令来近似特定执行的风险。RECSRF值允许软件设计者在给定的一组资源中选择最安全的资源组合,并允许软件实现者决定是否继续进行软件更改。该方法还可用于在运行时检测控制流劫持,方法是将其用作应用程序级入侵检测机制,允许在成功实现后将其转换为应用程序级入侵防护器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Ranging Code based on improved Logistic Map Chaotic Sequences A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes Cybercrime Countermeasure of Insider Threat Investigation A Novel Ultra-Wideband Antenna Operating in the frequency band of 2.5-40GHz Modelling Chlorophyll-a Concentration using Deep Neural Networks considering Extreme Data Imbalance and Skewness
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1