DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Kwangjo | - |
dc.contributor.advisor | 김광조 | - |
dc.contributor.advisor | Cha, Sang Kil | - |
dc.contributor.advisor | 차상길 | - |
dc.contributor.author | Hong, jina | - |
dc.date.accessioned | 2018-06-20T06:25:06Z | - |
dc.date.available | 2018-06-20T06:25:06Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675500&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/243501 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2017.2,[ii, 25 p. :] | - |
dc.description.abstract | Although Control-Flow Integrity (CFI) presents a powerful software defense paradigm, it requires a significant runtime overhead in practice. The traditional coarse-grained CFI solutions such as Microsoft's Enhanced Mitigation Experience Toolkit (EMET) address this issue by compromising the security enforced by the original CFI. Unfortunately, though, due to its relaxed policy, new types of exploits have been emerging lately. In this thesis, we present RecurFI, a novel coarse-grained CFI solution that proposes a new sweet spot between security and performance. We define the CFI policies by capturing the general pattern of normal execution and examine recursively whether execution of the protected process satisfy the CFI policies or not. We show that RecurFI can detect all the exploits in our experiment with less than 2% runtime overhead on average. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Security | - |
dc.subject | Runtime Monitoring | - |
dc.subject | Vulnerabilities | - |
dc.subject | 보안 | - |
dc.subject | 실시간 모니터링 | - |
dc.subject | 취약점 | - |
dc.title | RecurFI | - |
dc.title.alternative | RecurFI : 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :정보보호대학원, | - |
dc.contributor.alternativeauthor | 홍진아 | - |
dc.title.subtitle | Practical coarse-grained CFI on windows binary code | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.