Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Secure Execution via Program Shepherding
Tweet

connect with us

Secure Execution via Program Shepherding

Abstract: 

We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three techniques as building blocks for security policies. First, shepherding can restrict execution privileges on the basis of code origins. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. Second, shepherding can restrict control transfers based on instruction class, source, and target. For example, shepherding can forbid execution of shared library code except through declared entry points, and can ensure that a return instruction only targets the instruction after a call. Finally, shepherding guarantees that sandboxing checks placed around any type of program operation will never be bypassed. We have implemented these capabilities efficiently in a runtime system with minimal or no performance penalties. This system operates on unmodified native binaries, requires no special hardware or operating system support, and runs on existing IA-32 machines under both Linux and Windows.

Vladimir Kiriansky, MIT

Derek Bruening, MIT

Saman Amarasinghe, MIT

BibTeX
@inproceedings {270567,
author = {Vladimir Kiriansky and Derek Bruening and Saman Amarasinghe},
title = {Secure Execution via Program Shepherding},
booktitle = {11th USENIX Security Symposium (USENIX Security 02)},
year = {2002},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/11th-usenix-security-symposium/secure-execution-program-shepherding},
publisher = {USENIX Association},
month = aug,
}
Download

Links

Paper: 
http://www.usenix.org/events/sec02/full_papers/kiriansky/kiriansky.pdf
Paper (HTML): 
http://www.usenix.org/events/sec02/full_papers/kiriansky/kiriansky_html/index.html
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us