Typed virtual table for mitigating virtual table hijacking가상 함수 하이재킹 공격 완화 기법에 대한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 442
  • Download : 0
Object-Oriented Programming is essential for the developing the large size program. Object-Oriented Programming has a characteristic, Polymorphism, which is that the called function depends on the type of object. In the C++, there is the reserved word virtual for supporting polymorphism. Because the called function at the virtual function callsite can differ dynamically, the callsite is compiled as an indirect call. Therefore, if attackers change the virtual table pointer in an object, they can hijack the control flow. It is called as virtual table hijacking attack. In this paper, we suggest the new mitigation technique, TVT. TVT saves the type of the object in the constructor and checks that the type is changed at the callsites. We apply TVT to the firefox browser and tiny vulnerable program, and TVT can prevent all known test exploits. It shows reasonable overhead that is up to 48% for the SPEC2017 benchmark and average 20% for the firefox browser. Because the web page loading overhead is about 10%, which is less than network latency, TVT can apply to browsers.
Advisors
Kim, Yongdaeresearcher김용대researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2018
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2018.2,[v, 30 p. :]

Keywords

C++▼a가상함수▼a가상함수 하이재킹▼a시스템 보안▼a취약점▼a완화; C++▼aVirtual Function▼aVirtual Function Hijacking▼aSystem Security▼aVulnerability▼aMitigation

URI
http://hdl.handle.net/10203/267170
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=734113&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0